59
Report on the Research at the Institute of Informatics of the University of Szeged 2003–2006 Szeged, 2007

Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Report on the Research

at theInstitute of Informatics of the

University of Szeged

2003–2006

Szeged, 2007

Page 2: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

A Short Introduction of the Institute

I. HISTORY AND MISSION

Systematic education in computer science waslaunched within the Mathematical Institute at the endof the 1950’s by Laszlo Kalmar. The Institute of In-formatics was founded as an independent unit in 1990.The head of the Institute: Prof. Zoltan Fulop. Thedeputies of the head: Dr. Eva Gombas (student af-fairs) and Dr. Karoly Devenyi (management)

The Institute consists of five departments and aresearch group:

• Department of Applied Informatics, head of thedepartment: Dr. Tibor Csendes1

• Department of Computer Algorithms and Arti-ficial Intelligence, head of the department: Prof.Janos Csirik

• Department of Foundations of Computer Sci-ence, head of the department: Prof. Zoltan Esik

• Department of Image Processing and ComputerGraphics, head of the department: Dr. EorsMate2

• Department of Software Engineering, head ofthe department: Dr. Tibor Gyimothy

• Research Group on Artificial Intelligence of theHungarian Academy of Sciences, head of the re-search group: Prof. Janos Csirik

The main activities of the institute are the edu-cation and research of modern informatics and com-puter science knowledge. Here we provide a sketch ofour educational programs and research activities.

II. EDUCATION

The institute offers BSc, MSc, and PhD degrees. Thecurricula consist mainly of mandatory courses for un-dergraduates and a broad spectrum for specializationat graduate level. The curricula have already beenadjusted to conform to the so-called Bologna project,embracing most of the topics of modern informaticsand computer science.

The informatics/computer science and some of theengineering courses belong to the departments of theInstitute of Informatics. The Institute of Mathemat-ics and the Faculty of Economics and Business Ad-ministration are responsible for the mathematics andeconomics courses. The physics courses are taught bythe Departments of Physics. In the Computer Engi-neer BSc program we cooperate with the KecskemetCollege.

BSC PROGRAMS

Presently we have three programs at undergradu-ate level: Computer Economist, Computer Engineer,and Computer Program Designer.

1Dr. Balazs Imreh was the head between 2003-2005.2Prof. Attila Kuba was the head between 2003-2006.

Computer Economist, BSc

The normal duration of the program is 7semesters. The program produces experts who arewell versed in the information society, and are ableto understand and solve the problems arising in realbusiness processes. They can manage the informa-tion technology supporting the business needs, suchas to improve on the knowledge base and businessintelligence of companies, model the cooperation ofinfo communication processes and technologies, con-trol those processes, identify problems, and developapplications (and also maintain and monitor theirquality). Moreover the graduates are equipped bythe theoretical basics to continue their studies at MSclevel.

Computer Engineer, BSc

The normal duration of the program is 7semesters. The goal of the program is to train com-puter experts with solid engineering skills. The grad-uates are expected to install and operate complex sys-tems, especially in the information infrastructure area,and also to plan and develop the data and programsystem of such systems. This means skills both inhardware and advanced software technology, involvingmodeling, simulation, performance, reliability, config-uration, trouble shooting, maintenance, and develop-ment of systems. They are also provided with ap-propriate basic knowledge to continue their studies atMSc level.

Computer Program Designer, BSc

The normal duration of the program is 6semesters. The graduates are supposed to have highskills in planning and development of company infor-mation systems using modern software tools. Further-more, they are trained in the planning, developmentand operation of decision support systems, expert sys-tems, and multimedia systems. The graduates also re-ceive firm basis in Computer Science knowledge in or-der to have suitable knowledge to continue their stud-ies at MSc level.

GRADUATE PROGRAMS

Computer Program Designer, MSc

The normal duration of the program is 4semesters. The goal of the training is to produce infor-matics/computer science experts who have firm theo-retical basis, and they are able to expand their knowl-edge autonomously in a long run. They can work inteams or on their own, to develop, produce, apply, in-troduce, maintain, and to service information systemsat high level. Furthermore, they possess the necessarycooperation and model making skill that are neededfor solving of the informatics problems arising in theirfields. They are also able to conduct research work,and to continue their studies at PhD level. There aresix offered fields for specializations: Image Processing,Artificial Intelligence, Model Making for Informati-cians, Operations Research, Computer Science, andSoftware Development.

1

Page 3: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

PhD program in Computer Science

In addition of the above programs, a doctoral pro-gram in Computer Science is available since 1993. Theaim of this program is to support graduate studies,leading to the degree of PhD in computer science,with an emphasis on theoretical aspects. The pro-gram is part of the Doctoral School in Mathemat-ics and Computer Science of the Faculty of Scienceof the University of Szeged. It is composed of threesubprograms: Theoretical Computer Science, Opera-tions Research and Combinatorial Optimization, andApplications of Computer Science. The possible re-search topics include mostly come from those parts ofcomputer science and related areas, which are beinginvestigated at the Institute of Informatics. The nor-mal duration of the program is 6 semesters. Studentsare required to take entrance examinations for the ad-mittance. The State of Hungary usually supports upto 5-6 new fellowships every year that is offered toHungarian citizens. Foreign students are not entitledfor that fellowship, their tuition and other expenseshave to be supported from other sources.

III. RESEARCH THEMES AND CO-OPERATIONS

The departments of the Institute conduct research inthe following areas.

Department of Applied Informatics

Reliable computing, interval optimization, dis-crete optimization, PNS problems, extremal graphtheory, combinatorial games, and history of mathe-matics.

Department of Image Processing and Com-puter Graphics

Image models based on random Markov fields,Parametric estimation of transformations, Higher or-der active contour models, Analysis of satellite pic-tures, Digital spatial models. Vectorization of scanneddrawings, Computer-Aided surgery. Medical imageanalysis, Skeletonization by thinning, Image registra-tion, and Discrete tomography.

Department of Foundations of Computer Sci-ence

Algebra and logics in computer science, Automataand formal languages. Tree-automata and tree-transducers. Term rewriting systems, and fixed pointsin computer science. Process algebras, Temporal log-ics. Structures in computer science: semirings andsemi-modules, and categorical algebras.

Department of Computer Algorithms and Ar-tificial Intelligence

Automata theory, Fuzzy theory, Bin packing,Meta heuristics, String matching, On-line algorithms,Machine Learning and Computational Learning The-ory, Multi-Criteria Decision Making, Scheduling,Robotics, and Mechatronics.

Department of Software Engineering

Static and dynamic analysis of software systems.Slicing for imperative languages and logical program-ming. Reverse engineering. Open source software de-velopment. Linux file system and GCC compiler op-timization. Embedded systems. Ad-Hoc networks.

Process synthesis. Optimization problems arising inchemistry, biology and industry.

Research Group on Artificial Intelligence

Machine learning, Computational learning theory.Natural language procession, Language technology,Speech technology, Peer-to-peer algorithms and sys-tems.

The members of the Institute of Informatics pub-lish about 150 scientific papers in highly respected in-ternational journals/proceedings anually.

Partners

The Institute of Informatics has joint pro-grams and research cooperation (e.g. CEEPUS,SOCRATES/ERASMUS) with the following highereducation institutes from North-America, Europe,and Asia.

Canada: University of Waterloo, Canada, Queen’sUniversity, Canada.USA: Boston University, MA, City University of NewYork, NY, Columbia University, New York, NY, TheUniversity of Iowa, Iowa City, IA, University of Illi-nois at Urbana-Champaign, IL, Stevens Institute ofTechnology, Hoboken NJ, AT&T Labs.Austria: Technische Universitat Wien, MedizinischeUniversitat Graz, Technische Universitat Graz.Czech Republic: Charles University, Prague.Denmark: University of Aalborg.England: University College London, GB.Finland: University of Turku, Lappeenranta Univer-sity of Technology.France: University of Bordeaux, INRIA, Sophia An-tipolis, University of Paris 6 and 7.Germany: Technische Universitat Ilmenau, Technis-che Universitat Dresden, Universitat Hamburg, Tech-nische Universitat Munchen, Universitat Erlangen-Nurnberg, Universitat Mannheim, Universitat Karl-sruhe, Universitat Stuttgart.Switzerland: University of Bern.Italy: University of Rome La Sapienza.Netherlands: Technical University of Eindhoven.Serbia: University of Nis, University of Novi Sad,Institut Mihajlo Pupin, Belgrad.Slovenia: University of Maribor.Spain: Universidad de Almeria, Universidad de Tar-ragona.China: Hong Kong University of Science & Technol-ogy.Israel: Ben-Gurion University of the Negev, Univer-sity of Haifa.Japan: Kyoto Sangyo University, University of Aizu.

IV. OTHER ACTIVITIES

CONFERENCE ORGANIZATION

We have organized several conferences from thefoundation of the Institute. In the last years the fol-lowing conferences were organized.16th International Symposium on Fundamentals ofComputation Theory, Budapest, 2007.13th International Conference on Discrete Geometryin Computer Imagery, 2006.Logic and Combinatorics, Szeged, 2006.Computer Science Logic 2006, Szeged, 2006.Algebraic Theory of Automata and Logic, Szeged,2006.

2

Page 4: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

1. 2. 3. and 4. Hungarian Computer LinguisticsConference, Szeged, 2003, 2004, 2005, and 2006.AFL 05 - 11th International Conference on Automataand Formal Languages, Dobogoko, 2005.International Workshop on Soft Computing Applica-tions, Szeged-Arad, 2005.International Conference on Software Maintenance,2005.DLT’03 - Developments in Language Theory, SeventhInternational Conference, Szeged, 2003.European Symposium on Algorithms, Budapest,2003.Conference of PhD Students in Computer Science,Szeged, 2004 and 2006.Summer School on Image Processing, SSIP, Szeged,2004, 2005, and 2006.Veszprem Optimization Conference: Advanced Algo-rithms, Veszprem, 2004 and 2006.

Between the years 2000 and 2006 the people of theInstitute served in program committees of more than50 international conferences.

ACTA CYBERNETICA

A scientific journal, Acta Cybernetica hasbeen published since 1969 by the Institute inEnglish. The journal is available in about 150university departments worldwide, its homepage is:www.inf.u-szeged.hu/actacybernetica/starthu.xml

OTHER SCIENTIFIC SERVICE

Several members of the faculty work as editors ininternational scientific journals; they play significantroles in major scientific organizations and serve in pro-gram committees of major conferences.

Some of those journals: Acta Cybernetica, Cen-tral European Journal of Operations Research, Gram-mars, IEEE Transactions on Image Processing, Infor-matica, Pure Mathematics and Application, Theoret-ical Computer Science, Theoretical Informatics andApplications, Optimization Letters, and Oriental J.of Mathematics.

Organizations in which the Institute is repre-sented: European Association for Theoretical Com-puter Science, European Association for ComputerScience Logic, Gesellschaft fr Angewandte Mathe-matik und Mechanik, International Federation of In-formation Processing, and Association for ComputingMachinery.

V. RESOURCES

LIBRARIES

The Institute of Informatics has a library of whichholds about 5000 Hungarian and English volumes andsubscribes over 200 scientific journals. The recentlyrenewed University Library also an invaluable resourefor both our faculty and our students. It offers notonly numerous scientific books, journals but it servesas a place for study and host of conferences. Thedirectories of all libraries at the University are con-nected together, and their shelfed items are searchableby browsers.

HARDWARE/SOFTWARE

The Institute provides computer access for about3700 users. The students may use 220 worksta-tion (Pentium4 based or IBM machines), in whichboth Mircosoft and Linux operation systems are avail-able. All machines run by the Institute are linked to

switches with speed 100Mbps, while those switches arehooked by optical cables (1Gbps) to the main switchto the University Computer Center. The Institute alsooperates the following servers: 2 Sunfire 280R, 1 IBMeServer, 1 Compaq Alphaserver DS20, 3 HP Proliant,1 Sun Ultra Enterprise 2. (The servers are driven bySolaris 9, Linux, Windows 2000 Server or Windows2003 Server.) A cluster, consisting of 4 HP Proliantserver, has been working from the September of 2005.Its mass storage device is an MSA 500 disc array ofcapacity 1 TB.http://www.inf.u-szeged.hu/starten.xml

3

Page 5: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Research by DepartmentsDepartment of Applied Informatics

I. COMPUTER-ASSISTED PROOFSFOR CHAOTIC AND STABILITY BE-HAVIOUR IN DYNAMICAL SYSTEMS

INTRODUCTION

An important question is while studying approx-imations of the solutions of differential equations,whether the given problem has a stable solution orchaotic behaviour. We study verified computationalmethods to check regions the points of which fulfillthe conditions of some behaviour.

In this case the verification means mathematicalverification. In the computer part, hence roundingand other errors were considered. Instead of real num-bers, we can also calculate with intervals. In case thebounds of the result interval are not computer repre-sentable, then they are rounded outward.

INVESTIGATION OF CHAOTIC REA-GIONS FOR THE HENON MAP

The problem is usually solved by careful study-ing the given problem with much human interaction,followed by an estimation of the Lipschitz constant,bounding the rounding errors to be committed, andfinally a number of grid points are checked one by oneby a proper computer program [15]. Instead of that,we introduce a new – interval arithmetic based – au-tomatized method.

a b c d

Q0 Q1

Figure 1. The parallelograms and the starting intervalcovered by the verified subintervals for which eitherthe given condition holds, or they do not contain apoint of the argument set.

To check the existence of chaotic reagions wehave set up an adaptive subdivision algorithm basedon interval arithmetic. First the algorithm deter-mines the starting interval, that contains the regionto be checked. Then the three inclusion relations arechecked one after the other.

All of these proved to be valid – as expected. Theamount of function evaluations (for the transforma-tion, i.e. for the seventh iterate of the Henon mapping

(H(x1, x2) = (1 − Ax21 + x2, Bx1)) in each case)

were 273, 523, and 1613, respectively. The algorithmstores those subintervals for which it was impossibleto prove whether the given condition holds, these re-quired further subdivision to achieve a conclusion (seeFigure 1). The depth of the stack necessary for thechecking was 11, 13, and 14, respectively. The CPUtime used proved to be negligible, only a few seconds.

We have proven that this algorithm is capable toprovide the positive answer after a finite number ofsteps, and also that the given answer is rigorous inthe mathematical sense. Once we have a reliable com-puter procedure to check the conditions of chaotic be-havior of a mapping it is straightforward to set up anoptimization model that transforms the original chaoslocation problem to a global optimization problem.

The key question for the successful application of aglobal optimization algorithm was how to compose thepenalty function. On the basis of earlier experiencescollected with similar constrained problems, we havedecided to add a nonnegative value proportional tohow much the given condition was hurt, plus a fixedpenalty term in case at least one of the constraintswas not satisfied.

We have applied the global optimization model forthe 5th iterate Henon mapping. Note that the less theiteration number, the more difficult the related prob-lem: no chaotic regions were reported for the iteratesless than 7 till now. Table 1 presents the numericalresults of the ten search runs.

LO ZO FE PE T12 4 13,197 4,086 1712 1 12,913 3,365 1612 1 13,569 4,303 1912 2 12,918 3,394 1612 1 14,117 5,083 1812 3 21,391 7,400 2512 2 12,623 3,296 1612 0 15,388 6,221 3012 3 13,458 3,858 1512 2 14,643 5,002 16

Table 1. Numerical results of the search runs (HereLO stands for the number of local optima found, ZOfor the number of zero optimum values, FE for thenumber of function evaluations, PE for the numberof penalty function evaluations, and finally T for theCPU time used in minutes.)

We applied successfully this method to locate sev-eral chaotic regions of Henon map, and gave a lowerbound for topological entropy. The topological en-tropy characterizes the mixing of points by the Henonmap. The numerical results are publised in [2–6,11].

4

Page 6: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

CHAOTIC BEHAVIOUR OF THE FORCEDDAMPED PENDULUM

Recently, a few papers considered real dynamicalproblems and give a mathematical proof to chaotic be-haviour [13]. In this research we investigated a forceddamped pendulum as the mechanical model, i.e. wehave a body on a weightless solid rod, forced to moveon a vertical circle around the center point. The massand the length of the pendulum are equal to 1. Wehave a not negligible friction depending on the speedof the pendulum with a friction factor of b = 0.1. Anexternal periodic force is applied to the body, cos(t),where t is the time (it is independent of all other fac-tors).

The related second order differential equation is

x′′ = cos(t)− 0.1x′ − sin(x),

where x is the angle of the pendulum, and x′ is theangle speed of the pendulum.

In the proof we will need certain quadrilaterals{Qk}k∈Z “long” in the unstable and “short” in thestable directions so that there are “exceptional” orbitsof the Poincare mapping P with the following proper-ties:

• an exceptional orbit is contained in ∪k∈ZQk;

• an exceptional orbit visits the quadrilateralsconsecutively: if Pn(x0, x

′0) ∈ Qk for some

k, n ∈ Z, then either Pn+1(x0, x′0) ∈ Qk−1 or

Pn+1(x0, x′0) ∈ Qk or Pn+1(x0, x

′0) ∈ Qk+1.

In the main step of the proof of chaotic behaviourwe will show that for an arbitrary consecutive order{Qik}k∈Z of quadrilaterals there is an exceptional or-bit visiting the quadrilaterals in the prescribed order.To this end we have to know forward images P (Qk)and backward images P−1(Qk) (see Figure 2).

x′

x

1

Q0 Q1Q−1

P (Q0)

x′

x

1

Q0 Q1Q−1

P−1(Q0)

Figure 2. Forward and backward Poincare map int = ±2π time points of Q0.

We applied the earlier mentioned subdivisionmethod, which was able to prove the chaotic beha-viour of the considered systems. The details of theproof was published in [7,8].

INVESTIGATION OF A DELAY DIFFER-ENTIAL EQUATION

E.M. Wright considered the delay differentialequation

z′(t) = −αz(t− 1)(1 + z(t)),

where α is a positive number, and the initial functionφ(s) is a constant, c > −1, i.e. φ(s) = c for s ∈ [−1, 0].

To simplify the further calculations use the sub-stitution z(t) = ey(t) − 1. Then z′(t) = ey(t)y′(t) and

z(t−1) = ey(t−1)−1. We obtain the delay differentialequation

y′(t) = −α(ey(t−1) − 1),

where the initial function is φ(s) = c, s ∈ [−1, 0].E.M. Wright conjectured in a paper [14] published

in 1955 that all solutions of this delay differentialequation converge to zero for a wide set of the pa-rameter α. He gave a proof of the statement for αvalues between 0 and 1.5, and conjectured to be truefor further α values below π/2.

We described and proved the correctness of a new,even more stronger bounding scheme that allows anefficient shrinking of the possible extreme values of aperiodic solution. The present approach follow an-other line of thought, still it is a kind of extension ofthat of Wright.

We applied our Taylor series based algorithm tobound the trajectories. This method was publisedin [1], and we illustrate the result in the case of α = 1.5on Figure 3.

y

y′

Figure 3. The bounded trajectory in y, y′ coordinatesystems.

After the theoretical investigations the remainingproblem to be solved is to prove that for α valuesbetween 1.5 and π/2 no periodic solution exists withM and m absolute extreme values larger than 0.075.

We implemented a new parallel Branch and Boundalgorithm, which is able to prove the remaining prob-lem, so we prove Wright original conjecture. The com-puter part of the proof is published in [9,12].

ACKNOWLEDGEMENTS

The authors are grateful to Barnabas Garay(BME, Budapest, Hungary), Laszlo Hatvani (SZTE,Szeged, Hungary), Tibor Krisztin (SZTE, Szeged,Hungary), and Arnold Neumaier (University of Vi-enna) for their contribution and support.

This works have been partially supported by theBilateral Austrian-Hungarian project ou56011, andHungarian Science and Technology Fundaton No. E-25/2004, as well as by the Hungarian National ScienceFoundation Grant OTKA No. T 048377 and No. T046822.

5

Page 7: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

REFERENCES

[1] B. Banhelyi: Egy kesleltetett differencialegyenletvizsgalata megbızhato szamıtogepes eljarassal (InHungarian). Alkalmazott Matematikai Lapok,2007. Accepted for publication.

[2] B. Banhelyi, T. Csendes, and B.M. Garay: Op-timization and the Miranda approach in detect-ing horseshoe-type chaos by computer. Interna-tional Journal of Bifurcation and Chaos, 2007.Accepted for publication.

[3] B. Banhelyi, and T. Csendes: A verified com-putational technique to locate chaotic regions ofHenon systems. Proceedings of the 6th Interna-tional Conference on Applied Informatics, Eger,297–304, 2004.

[4] B. Banhelyi, T. Csendes, and B.M. Garay: Aglobal optimization model for locating chaos:numerical results. Proceedings of the In-ternational Workshop on Global Optimization,Almerıa (Spain), 35–39, 2005.

[5] B. Banhelyi, T. Csendes, and B.M. Garay: Averified optimization technique to bound topo-logical entropy rigorously. 2007. Submitted forpublication.

[6] B. Banhelyi, T. Csendes, and B. M. Garay: Σ2

chaos for iterates of the classical Henon mapping.2007. Manuscript.

[7] B. Banhelyi, T. Csendes, B.M. Garay, andL. Hatvani: Computer assisted proof of chaoticbehaviour of the forced damped pendulum. 2007.Submitted for publication.

[8] B. Banhelyi, T. Csendes, B.M. Garay, andL. Hatvani: A computer-assisted proof for Σ3-chaos in the forced damped pendulum equation.2007. Manuscript.

[9] B. Banhelyi, T. Csendes, T. Krisztin, andA. Neumaier: Proof for a conjecture of Wrighton a delay differential equation II. – ComputerAided Part. 2007. Submitted for publication.

[10] T. Csendes, B. Banhelyi, and B.M. Garay: Aglobal optimization model for locating chaos.Proceedings of the International Workshop onGlobal Optimization, Almerıa (Spain), 81–85,2005

[11] T. Csendes, B. M. Garay, and B. Banhelyi: Averified optimization technique to locate chaoticregions of a Henon system. Journal of GlobalOptimization, 145–160, 2006.

[12] T. Csendes, B. Banhelyi, and L. Hatvani: To-wards a computer-assisted proof for chaos in aforced damped pendulum equation. Journal ofComputational and Applied Mathematics, 378–383, 2007.

[13] J.H. Hubbard: The forced damped pendulum:Chaos, complication and control. Amer. Math.Monthly, 741–758, 1999.

[14] E. M. Wright. A non-linear difference-differentialequation. Journal fur die Reine und AngewandteMathematik, 194:66–87, 1955.

[15] P. Zgliczynski: Computer assisted proof of thehorseshoe dynamics in the Henon map. RandomComput. Dynam., 5:1–17, 1997.

II. OPTIMIZATION OF COMPLEXTRANSPORTATION PROCEDURES

During the organization of the transportation proce-dures many optimization problems arise. The deci-sion maker has to assign goods to different vehiclesand the optimal paths in the road system has to bedetermined. The optimal path and also the cost ofthe path may depend on the type of the used vehi-cle. In [1] we suppose that two places are given thedestination point and the termination point and someamount of good must be transported between theseplaces. We have a practical packing problem that thegoods are packed into three dimensional boxes, a boxcan be described by its size and its weight. Vehiclesbelonging to different types can be used for the trans-portation of the boxes.

We also consider [2, 3] the model where a vehiclehas to visit the places but it can be used for internaltransports. This means that in the case when a place iis visited before a place j then the vehicle can be usedto transport some goods from i to j. The profit whichcan be achieved by such a transport is denoted by Bij .Thus the goal is to find an ordering of the places whichmaximize the total profit which can be achieved bythe internal transports according to the cost of travel-ling. We call this problem min-cost Hamiltonian pathproblem with internal transport, HPPIT in short.

A BIN PACKING APPROACH OF A SHIP-MENT CONSTRUCTION

Our optimization subproblem can be formulatedas a generalized version of the three-dimensional binpacking problem. In box packing problem three di-mensional boxes must be packed without overlappinginto the minimal number of three dimensional unitcube. This problem was defined in previous papersand later many algorithm were developed for the so-lution of the problem. In our model there are differentboxes which can be used for packing the items, thusour model is related to the variable sized bin pack-ing problem, where the bins which can be used topack the elements may have different size. The no-tion of bin packing and its multidimensional versionswith variable sizes and heuristic algorithms to it weredeveloped as we noted in references of [1]. The newmodel differs in two ways from the variable sized mul-tidimensonal model. In this model there is a furtherrestriction on the bins, each type of bins has a weightlimit and the total weight of the boxes assigned to abin (vehicle) cannot be more than the weight limit ofthe vehicle. Moreover in the new model we have amore general cost function, the cost of a bin dependson its type, but it can be an arbitrary value it is notthe volume of the bin.

HAMILTON PATH PROBLEM WITH IN-TERNAL TRANSPORTS

Important combinatorial optimization problemsrequire finding a permutation of vertices of a com-plete digraph that minimizes a certain cost function.The most familiar one is the min-cost Hamiltonianpath problem - or its closed-path version, the Travel-ling Salesman Problem (TSP ) -, when the cost of apermutation depends on consecutive node pairs only.Another problem is known as the Linear OrderingProblem (LOP ) when we want to find a linear or-der of the nodes of a digraph such that the sum ofthe arc weights, which are consistent with this order,

6

Page 8: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

is as large as possible. Now we consider a new op-timization model using a mixed linear cost functionfrom these two. Motivation of this common general-ization of TSP and LOP is the above practical ques-tion. Thus the goal is to find an ordering of the placeswhich maximize the total profit which can be achievedby the internal transports according to the cost oftravelling. We call this problem min-cost Hamilto-nian path problem with internal transport, HPPITin short. Heuristics on TSP or LOP can be modifyto our problem and give new ones. The vehicle rout-ing problem with inner transportation leads to thefollowing mathematical model. Let G(V,A) be a di-rected complete graph, where V = v0, v1, . . . , vn is theset of vertices, (v0 is the depot, and the other verticesare the places which should be visited by the vehicle).Furthermore two (n+1)x(n+1) nonnegative matricesare given, B and D. Bij is the possible profit whichcan be achieved by the inner transportation from vi

to vj if vi is visited before vj (Bii = 0 for each i). Dij

gives the cost of travelling from vi to vj (Dii = 0 foreach i).

In the HPPIT problem we would like to find atour which visits each city exactly once and starts atthe depot and returns there at the end of the tour.The objective is to maximize the total profit achievedby the inner transportation taking into account thecost of the tour. A feasible solution can be definedas a permutations p of the set {1, .., n}. The per-mutation describes the tour where the vehicle startsand ends at v0 and visits the other vertices in the or-der vp(1), vp(2), .., vp(n). Then the objective function isgiven by the formula

z(p) =X

0<i<j<n+1

Bp(i),p(j) +

nXi=1

(B0,p(i) +Bp(i),0)

−X

0≤i<n

Dp(i),p(i+1) −Dp(n),0,

and the goal is to maximize this function. In the ob-jective function the profit of the inner transportationfrom and to v0 is independent on the order of the othervertices, thus it is a constant.

During the empirical analysis we investigated 14heuristic algorithms.

ACKNOWLEDGEMENTS

The mentioned research tasks were supported bythe following grants: Hungarian National Foundationfor Scientific Research, OTKA T046405(2004-2007);NKFP OM-00186/2004

REFERENCES

[1] Blazsik, Z., B. Imreh, Cs. Imreh, Z. Kovacs, Ona Bin Packing Approach of a Shipment Con-struction Problem, Proceedings of microCAD2006, International Scientific Conference, Mate-rial Flow Systems. Logistical Information Tech-nology: 15-19 (2006).

[2] Blazsik, Z., B. Imreh, Cs. Imreh, Z. Kovacs, TheTSP problem with internal transports, Proceed-ings of microCAD 2006, International ScientificConference, Material Flow Systems. LogisticalInformation Technology: 9-13 (2006).

[3] Blazsik Z., T. Bartok, B. Imreh, Cs. Imreh, Z.Kovacs, Heuristics on a Common Generalization

of TSP and LOP, 6th Joint Conference on Math-ematics and Computer Science, Pecs, July 12-15,(2006) submitted for publication.

III. GRAPHS AND GAMES

EXTREMAL GRAPH THEORY

In [1] we considered the interval number, an im-portant graph parameter. Partial characterization isgiven for the extremal cases of the degree formula,and we also give bounds on the interval number i(G)if certain induced subgraphs are not present in G.

The paper [3] generalizes the classical theorem ofNash-Williams asserting that any planar graph can becovered by three forests. We show that additionallyone of those forests has maximum degree at most 8.Similar results are obtained for outerplanar, series-parallel and K3,2 minor-free graphs.

We investigate the edge-bandwidth of grid-typegraph in [4]. Those are the n×n planar grid Pn⊕Pn

and tori Cn⊕Cn, the n-dimensional cube Pn2 , and the

Kn ⊕Kn. In all cases asymptotically sharp bound onthe edge-bandwidth are given.

POSITIONAL GAMES

In [2] we introduce the idea of the recycled versionof games and prove some results on those. The mainresults are a logarithmic upper and lower bounds onthe recycled line game, and a 3√n upper bound on therecycled Kaplansky game if the players use n marks.

The paper [5] solves some biased graph games.It extends the result of Szekely and Beck on degreegame, and the method has consequences for the bal-ance games. We discuss the general diameter gameson the complete graph on n vertices. It defies theheuristic intuition for the 1:1 case, but the accelerationof the game smooths out some of the irregularities.

The survey paper [6] gives a detailed introduc-tion to Positional Games, while it contains somenew results. These are as follows: the bandwidthgames on Pn ⊕ Pn, random proof for Chooser’s winin some Picker-Chooser games, Erdos-Selfridge typeof theorem for random hypergraph games, bounds onChooser-Picker degree games etc.

ACKNOWLEDGEMENTS

The research was partially supported by OTKAgrants T034475 and T049398.

REFERENCES

[1] J. Balogh, P. Ochem, and A. Pluhar, On theInterval Number of Special Graphs. Journal ofGraph Theory 46 (2004) 241–253.

[2] A. Pluhar, The Recycled Kaplansky’s Game.Acta Cybernetica 16 (2004) 451–458.

[3] J. Balogh, M. Kochol, A. Pluhar, and X. Yu, Cov-ering planar graphs with trees. Journal of Com-binatorial Theory B 94, (2005) 147–158.

[4] J. Balogh, D. Mubayi, and A. Pluhar, On theedge-bandwidth of graph products. TheoreticalComputer Science 359 (2006) 43–57.

[5] J. Balogh, R. Martin, and A. Pluhar, The diam-eter game. Horizon of Combinatorics conference,Balatonalmadi, July 15-22, 2006.

[6] Pluhar Andras, Pozıcios jatekok. (in Hungarian)will appear in Szigma.

7

Page 9: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

IV. NEW APPROACHES TO CIRCLEPACKING IN A SQUARE

The optimization problem of the densest packing ofequal circles in a square arises from discrete geo-metry, it has become a well-studied problem in thepast decades. The research in this topic on our partbegan nearly 10 years ago. During the 2003-06 periodwe have summarized our results in a book (with a CD)and some articles. In this time period P.G. Szabo fin-ished his Ph.D. thesis about the circle packings [10].

INTRODUCTION

It is easy to understand what the densest circlepacking is: to position a given number of equal circlesin such a way that the circles fit fully in a square with-out overlapping. We gave some geometrical forms ofthe problem and we proved their equivalence. Since westudied the problem as a global optimization problem,we classified its mathematical models into the suitableproblem classes of mathematical programming. Animportant experience of our research was to realizethat those methods were efficient which strongly usedthe geometrical properties of the problem [11].

BOUNDS

First of all, we investigated how theoretical boundscan be determined for the optimum value. It wasa natural idea to improve the lower bounds by ap-plying computer and using global optimization tech-nology. We checked the numerical results by inter-val arithmetic computations using the PROFIL/BIASC++ library, so their reliability is now proved by com-puter. Based on E. Specht’s modified billiard simula-tion method approximate circle packings up to 200were given. We have investigated the problem of theexistency of the structure of the circle packings basedon the theory of Groebner bases, namely how the ex-istency of a circle packing can be proved with a givenstructure [1–3,12].

OPTIMAL PACKINGS

A new verified optimization method was presentedfor the circle packing problem. The developed algo-rithm is based on interval analysis. As one of themost efficient parts of the algorithm, an interval-basedversion of a previous elimination procedure is intro-duced. This method represents the remaining areasstill of interest as polygons fully calculated in a reli-able way. Currently the most promising strategy offinding optimal configurations is to partition the orig-inal problem into subproblems. Still as a result ofthe highly increasing number of subproblems, earliercomputer-aided methods were not able to solve prob-lem instances where the number of circles was greaterthan 27. M.Cs. Markot provided a carefully devel-oped technique resolving this difficulty by eliminatinglarge group of subproblems together. This elimina-tion method played a key role in solving the previ-ously open problem instances of packing 28, 29, and30 circles [4,6,9].

REAPETED PATTERNS

Using the proven and the best known circle pack-ings, we have investigated the structures of the pack-ings, determined some pattern- and structure classesand included the special cases into them. The clas-sification was based on a common algorithmical de-scription of the structures and a number theoretical

m=0.19436506314440r=0.08136752704097d=0.81117902717206

n=39c=80f=0

Figure 4. A grid circle packing for 39 circles.

relationship of the number of the circles. We studiedseparately a conjecture on an infinite circle packing se-quence of the literature and we investigated the gridpacking class too. Based on the pattern classes wehave improved also the theoretical bounds. We gavesharp constant lower and upper bounds of the den-sity [5].

MINIMAL POLYNOMIALS

We worked on the minimal polynomials of thepackings. We have investigated the question whethera circle packing contains optimal substructures, howthe minimal polynomial of the packing can be deter-mined based on the general minimal polynomials ofthe substructures. This problem was solved by us-ing the resultants. We demonstrated some examples,how the method can be used. The minimal polynomi-als were published and also the exact values for somecases until 100 circles. We studied separately the al-gebraic solution of the P11(m) = 0 equation, wherewe guessed the suitable quadratical field based on thestructure of the packing and we have found the ex-act value by a CAS (Computer Algebra System). Wehave also given a classification of the linear, quadrati-cal and quartical packing classes and the connection isexplained with the previous studied pattern classes [7].

Our summarized results are published in a book atSpringer [13]. One especially important feature of thebook is the inclusion of all the open source program-ming codes used on an enclosed CD. The wider scien-tific community has already been involved in checkingthe codes and has helped in having the computationalproofs accepted. The main results we have summa-rized in a survey article, too [8].

REFERENCES

[1] Szabo, P.G.: On proving existence of some cir-cle packings in a square using computer algeb-ra systems. In: 6th International Conference onApplied Informatics (January 27-31, 2004, Eger,Hungary), Vol. I, 2004. p. 487.

[2] Szabo, P.G.: Egybevago korok pakolasainegyzetben – korlatok es minimalpolinomok.In: XXVI. Operaciokutatasi Konferencia (2004.majus 26-28, Gyor). Eloadas kivonatok, 2004, p.26.

[3] Szabo, P.G.: Packing Equal Circles in a Square -bounds, minimal polynomials and classification.In: Volume of extended abstracts of Conferenceof PhD Students in Computer Science (July 1-4,2004, Szeged, Hungary), 2004, pp. 110-111.

8

Page 10: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[4] Markot, M.Cs. – Csendes, T.: A reliable methodfor verifying structural optimality of circle pack-ing configurations in the unit square. SCAN-2004Conference Book of Abstracts, Fukuoka, 2004,81.

[5] Szabo, P.G.: Packing Equal Circles in a Square- Bounds, Repeated Patterns and Minimal Poly-nomials. In: Volume of abstracts of SCAN 2004,11th GAMM-IMACS International Symposiumon Scientific Computing, Computer Arithmetic,and Validated Numerics (October 4-6, 2004,Fukuoka, Japan), 2004, p. 110.

[6] Markot, M.Cs. – Csendes, T.: A new verified op-timization technique for the ”packing circles in aunit square” problems. SIAM J. on Optimization16(2005) 193-219.

[7] Szabo, P.G.: Optimal substructures in optimaland approximate circle packings. Beitrage zur Al-gebra und Geometrie 46 (2005) No. 1. pp. 103-118.

[8] Szabo, P.G. – Markot, M.Cs. – Csendes, T.:Global Optimization in Geometry – Circle Pack-ing into the Square. In: Essays and Surveys inGlobal Optimization (GERAD 25th AnniversarySeries). Ed. by C. Audet, P. Hansen, and G.Savard. New York, 2005. Springer. pp. 233-266.

[9] Markot, M.Cs. – Csendes, T.: A reliable area re-duction technique for solving circle packing prob-lems. Computing 77 (2006) 147-162.

[10] Szabo, P.G.: Egybevago korok pakolasainegyzetben – korlatok, ismetlodo mintak esminimalpolinomok (In Hungarian). Ph.D. Thesis.Szeged, 2005. University of Szeged. 99 p. (2006).

[11] Szabo, P.G.: Grid circle packings - a global opti-mization approach. In: Volume of abstracts ofISMP 2006, 19th International Symposium onMathematical Programming (July 30-August 4,2006, Rio de Janeiro, Brazil), 2006, p. 34.

[12] Szabo, P.G. – Specht, E.: Packing up to 200Equal Circles in a Square. In: Models and Al-gorithms for Global Optimization: Essays Ded-icated to Antanas Zilinskas on the Occasion ofHis 60th Birthday (Springer Optimization andIts Applications, Vol. 4). Ed. by A. Torn, J. Zilin-skas. 2006. Springer. pp. 141-156.

[13] Szabo, P.G. – Markot, M.Cs. – Csendes, T. –Specht, E. – Casado, L.G. – Garca, I.: New Ap-proaches to Circle Packing in a Square. With Pro-gram Codes. Springer, Berlin, 2007.

V. HISTORY OF MATHEMATICS ANDINFORMATICS

During the period 2003-06, we worked on some books,book chapters and articles, based on our research onthe history of mathematics and informatics. A bigpart of the research on the History of Mathematicsis often an investigation of the correspondence andlegacy of scientists. In the following topics, we havesummarized, shortly, the studied scientific legacies.

FARKAS BOLYAI’S LEGACY

We found some interesting unknown mathematicalnotes of Farkas Bolyai (1775-1856) in his manuscriptson number theory from the second part of the 1850’syears. These results joined to the work of E. Kiss

(1929-2006) on Janos Bolyai’s number theoreticalgems. We found the proof of F. Bolyai for the Wilson’sTheorem and its conversion, results on the conversionof Fermat’s little Theorem, about the perfect num-bers, etc. These collected results show a strong con-nection between the father and his son in their com-mon last years too. We tried to give an answer for thefollowing question: “How did Janos Bolyai know that4 272 943 is a prime number?” E. Kiss refereed ourinvestigations in his works (e.g. in the second editionof his Bolyai-book). Later, we have written a commonpaper with Kiss about the manuscripts of Bolyais onthe Mathematical Analysis. The research was basedon the Bolyai’s collections in Marosvasarhely (Tirgu-Mures, Roumania) and Budapest (Hungary) [1–11].

LASZLO KALMAR’S LEGACY

In 2005 Laszlo Kalmar’s (1905-1976) correspon-dence with Hungarian mathematicians has been is-sued by us with notes, titled KALMARIUM. In 2006we have continued this work for to publish the secondpart of this book, titled KALMARIUM II, and wewrote some other articles about the life and works ofL. Kalmar. This research was based on the Kalmar’slegacy at the University of Szeged [12–17].

MARCEL RIESZ’S LEGACY

Continuing our general research direction, we haveexamined Marcel Riesz’s (1886-1969) legacy in theSwedish town of Lund. This research is a continu-ation of the work of L. Filep (1941-2004). By do-ing this, documents from Hungarian mathematicalschools of international significance become availableto the public and scholars, including important cor-respondence by Frigyes Riesz (1880-1956) and Mar-cel Riesz. We have concluded in earlier studies thatthese materials definitely contain items of mathemat-ical and historical worth, which help us understandthe history of mathematical problem solving in thetwentieth century. This is of a great significance, be-cause the Riesz brothers are famous in the world ofmathematics. Their articles are still cited, but notmuch is publicly known about their life and times.Most know only a few scant details about their sci-entific correspondence. They also worked in foreignscientific academies and circles, so these are of inter-national interest [18].

FURTHER RESEARCH

Some other research topics arised from differentkind of requests.

PANNONIAN PHOENIX

Pannonian Phoenix, or The Hungarian LanguageArisen From The Ashes – Our Earliest PrintedScientific Books from the 16th - 19th Centuries [19].

The National Szechenyi Library and the Hunga-rian Academy of Sciences organized the ’PannonianPhoenix’ exhibition. We gave the analytic descrip-tions of the following mathematical books:

• Aritmetica, az az A szamvetesnec tvdomania,mell(y) az tvdos Gemma Frisivsnac szam-vetesboelmagyar nyelure... forditattot. Debrecen, 1577.

• Tolvay Ferenc: Az Arithmetikanak; avagy ASzamlalasnak ot Speciesinek rovid MagyarRegulakban foglaltatott Mestersege. Kolozsvar,1698.

9

Page 11: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

• Onadi Janos: Practici algorithmi erotemata me-thodica, az az olly cselekedo szamok, mellyek konyukerdesek es feleletek altal rovid utat mutatnak arraa tudomanyra, melyben akar mely fele adasnaks vetelnek, osztalynak, vagy egyeb kereskedesben,csak a legg-kissebb summanak-is bizonyos szamatanitattik. Kassa, 1693.

• Marothi Gyorgy: Arithmetica, vagy szamvetesnekmestersege. Debrecen, 1743.

• Mako Pal: Bevezetes a szamvetesre a’ magyar eshozza tartozando tartomanyok’ nemzeti iskolainakszamara. Buda, 1780.

• Dugonics Andras: A’ tudakossagnak elso konyve,mellyben foglaltatik a’ betovetes (algebra). A’tudakossagnak masadik konyve, mellyben foglal-tatik a fold-meres (geometria). Pest, 1784.

• Bolyai Farkas: Az arithmetica eleje. Marosvasar-hely, 1830.

• Brassai Samuel: Euklides Elemei XV konyv. Pest,1865.

JOHN VON NEUMANN

In the year of von Neumann (2003) we have writ-ten some papers about the life and works of John vonNeumann (1903-1957) [20–23].

OTHER WORKS

There are some other works on Japanese Historyof Mathematics (Sangaku problems) [24], a forgot-ten Hungarian book on the ’upward’ continued frac-tions [25], magic squares [26,27], an old astronomicalinstrument “Jacob’s Ladder” [28], and we edited thelast unpublished work of L. David (1881-1962) on theCauchy-equation at Janos Bolyai’s work [29,30].

REFERENCES

[1] Szabo P.G.: Bolyai Farkas szamelmeleti vonatko-zasu keziratos hagyateka, Termeszet VilagaBolyai-emlekszam, 2003, pp. 57-61.

[2] Szabo P.G.: A 4 272 943 ,,edi szam”, TermeszetVilaga Bolyai-emlekszam, 2003, p. 62.

[3] Szabo P.G.: A Bolyai-negyzetek, Termeszet Vila-ga Bolyai-emlekszam, 2003, p. 61.

[4] Szabo P.G.: Idosebb Zeyk Miklos, az ismeretlennagyenyedi tudos, Termeszet Vilaga 134, 2003,No. 8, pp. 372-373.

[5] Szabo P.G.: Pavay Vajna Miklos levele uno-kajahoz, Bolyai Farkashoz, Muszaki Szemle (His-toria Scientiarum – 1, Special Issue in History ofSciences) 27 (2004) pp. 44-45.

[6] Szabo P.G.: A Wilson-tetelnek es megfordı-tasanak bizonyıtasa Bolyai Farkas keziratoshagyatekaban, Polygon 13, 2005, No. 2, pp. 1-10.

[7] Szabo P.G.: ”Kiss Elemer: Matematikai kin-csek Bolyai Janos keziratos hagyatekabol” cımukonyverol, Termeszet Vilaga 137, 2006, No. 4. p.188.

[8] Szabo P.G.: Bolyai Farkas keziratos hagyateka.In: A Magyar Tudomany Napja Erdelyben.Bolyai Farkas Emlekkonferencia. (2006. novem-ber 25-26, Csıkszereda, Romania) eloadaskivonatok, 2006, p. 19.

[9] Kiss E. – Szabo P.G.: A matematikai analızisproblemai a ket Bolyai keziratos hagyatekaban.(Submitted for publication).

[10] Szabo P.G. – Olah-Gal R.: Bolyai Farkas kezirataa kockakettozes problemajarol (Submitted forpublication).

[11] Kiss E. – Olah-Gal R.: Ujabb leveltari ku-tatasok Bolyai Janos eletmuvehez. A sajto alarendezesben kozremukodo: Szabo P.G.

[12] Szabo P.G.: KALMARIUM. Kalmar Laszlo leve-lezese magyar matematikusokkal (David Lajos,Erdos Pal, Fejer Lipot, Grunwald Geza, KerteszAndor, Konig Denes, Redei Laszlo, Renyi Alfred,Riesz Frigyes, Szele Tibor, Turan Pal, VargaTamas), Szeged, 2005. Polygon. 476 p.

[13] Szabo P.G.: KALMARIUM II. Kalmar Laszlo le-velezese magyar matematikusokkal (Aczel Janos,Fenyo Istvan, Gyires Bela, Hajos Gyorgy, LazarDezso, Lakatos Imre, Neumann Janos, Rado Ti-bor, Suranyi Janos, Szenassy Barna, Szokefalvi-Nagy Bela, Vincze Istvan). (Submitted for pub-lication).

[14] Szabo P.G.: Kalmar Laszlo hagyateka. In: XLV.Ratz Laszlo Vandorgyules (2005. julius 5-8,Salgotarjan) eloadas kivonatok, 2005. pp. 14-15.

[15] Bohus M. – Makay A. – Santane-Toth E. –Szabo P.G.: ”Kretaprogramozas” Kalmar Laszlovezetesevel (Az informatika oktatasanak kezde-tei Szegeden). In: Informatika a felsooktatasban2005 Konferencia (2005. aug. 24-26, Debrecen)eloadas kivonatok, 2005. p. 81.

[16] Bohus M. – Muszka D. – Szabo P.G.: A szegedi

informatikai gyujtemeny, Uj Kep 9, 2005, No. 10.pp. 35-40.

[17] Szabo P.G.: Ki rejtozik a mor alszakallmogott? (Valogatas Kalmar Laszlo feljegyze-seibol), SZEGED 17, 2005, No. 3. pp. 18-19.

[18] Riesz Frigyes es Riesz Marcell levelezese. FilepLaszlo gyujteset sajto ala rendezte es jegy-zetekkel ellatta: Szabo P.G. (Submitted for pub-lication).

[19] Szabo P.G.: Matematikatortenet + Historyof Mathematics descriptions. In: PannoniaiFeniksz, avagy hamvabol fel-tamadott magyarnyelv. Elso nyomtatott tudomanyos konyveink(16-19. szazad). Szerk. Gazda I., Stemler A. Bu-dapest, 2005. OSZK - MTA pp. 153-170.

[20] Szabo P.G.: Neumann Janos eletutja esmunkassaga, Pi-Matematikai folyoirat, MiskolciEgyetem I/II (2002/2003) pp. 1-13.

[21] Szabo P.G.: Neumann Janos ajanlja Szokefalvi-Nagy Belat, Termeszet Vilaga Neumann-emlek-szam, 2003. p. 47.

[22] Szabo P.G.: Neumann Janos es Szeged, Ter-meszet Vilaga Neumann-emlekszam, 2003. pp.48-51.

[23] Szabo P.G.: Neumann Janos (szocikk), In: Nem-zeti evforduloink 2007, Balassi Balint KulturalisIntezet Nemzeti Evfordulok Titkarsaga, Bp.,2006, p. 56.

[24] Szabo P.G.: Szangaku, a japan matematika kin-csei, Szaku 9, 2003, pp. 8-9.

[25] Szabo P.G.: A felfele meno lanctortek, Polygon12, No. 1-2. pp. 71-80.

10

Page 12: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[26] Szabo P.G.: Buvos negyzetek, ABACUS 10,2004, No. 7. pp. 27-29.

[27] Szabo P.G.: Buvos negyzetek, ABACUS 10,2004, No. 8. pp. 23-26.

[28] Szabo P.G.: Jakob botja, Muszaki Szemle (His-toria Scientiarum – 1, Special Issue in History ofSciences) 27, 2004, pp. 39-43.

[29] Szabo P.G.: David Lajos ,,hattyudala”. (Submit-ted for publication).

[30] David L.: Az F (x1) + F (x2) = F (x1 + x2)fuggvenyegyenlet Bolyai Janosnal. (Sajto ala ren-dezte David P. es Szabo P.G.). (Submitted forpublication).

11

Page 13: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Department of Computer Algorithms and Artificial Intelligence

I. AUTOMATA THEORY

We have continued to study complete systems of treeautomata. In [5] we gave necessary and sufficient con-ditions under which a system of tree automata is iso-morphically complete with respect to the αi-productsfor the class of asynchronous tree automata.

Little is known about the general properties of treelanguages recognized by deterministic root-to-frontiertree recognizers (DR tree languages). Therefore, wehave started to study special classes of DR tree lan-guages the counterparts of which are well-known inthe theory of finite state recognizers (definite, nilpo-tent, monotone languages). Paper [3] contains ourresults concerning closedness of nilpotent DR tree lan-guages under Boolean operations.

We say that a class M of finite monoids deter-mines a class K of tree languages recognizable by treerecognizers if a tree language is in K if and only if itssyntactic monoid is in M. Classes of monoids deter-mining the classes of definite and nilpotent DR treelanguages are given in [4].

Results of [4] show that the class of definite DRtree languages can be determined by the same class ofmonoids as the class of definite string languages. Thesame is true for the class of nilpotent DR tree lan-guages. This was the observation which motivated usto give general conditions in [2] under which a classof tree languages with a given property can be de-termined by the same class of monoids as the class ofstring languages having the same property. The resulthas been applied to certain classes of tree languages.

CONNECTIONS OF RESEARCH TO EDU-CATION

Tree automata and tree languages constitute dif-ferent graduate and PhD courses. The open prob-lems can serve as research subjects for PhD students.The textbook [1] gives a systematic treatment of fi-nite state recognizers, string languages, tree recogniz-ers and tree languages.

ACKNOWLEDGEMENTS

Research sketched above was supported by theHungarian National Foundation for Scientific Re-search, Grant T 48786.

REFERENCES

[1] Gecseg, F.: Automata and Formal languages (inHungarian). Polygon, Szeged, 2005.

[2] Gecseg, F.: Classes of tree languages determinedby classes of monoids. International Journal ofFoundations of Computer Science, submitted forpublication.

[3] Gecseg, F. and Gyurica, Gy.: On the closednessof DR tree languages under Boolean operations.Acta Cybernetica, 17(2006), 449-457.

[4] Gecseg, F. and Imreh, B.: On definite and nilpo-tent DR tree languages. Journal of Automata,Languages and Combinatorics, 9:1(2004), 55-60.

[5] Gecseg, F. and Imreh, B.: On asynchronous treeautomata. Journal of Automata, Languages andCombinatorics, accepted for publication.

II. ANALYSIS OF ALGORITHMS

BIN PACKING

In the classical bin packing, we are given a list Lof items (a1, a2, ..., an) each item ai ∈ (0, 1] and thegoal is to find a packing of these items into a mini-mum number of unit-capacity bins. In [6] we presentthe theoretical results on the on-line Sum-of-Squaresalgorithm. SS is applicable to any instance of binpacking in which the bin capacity B and the item sizess(a) are integer (or can be scaled to be so), and runsin time O(nB). It performs remarkably well from anaverage case point of view: For any discrete distribu-tion in which the optimal expected waste is sublinear,SS also has sublinear expected waste. For any dis-crete distribution where the optimal expected waste isbounded, SS has expected waste at most O(logn). Wealso discuss several interesting variants on SS, includ-ing a randomized O(nB logB)-time online algorithmSS∗ whose expected behavior is essentially optimal forall discrete distributions. Algorithm SS∗ depends ona new linear-programming-based pseudopolynomial-time algorithm for solving the NP-hard problem of de-termining, given a discrete distribution F , just what isthe growth rate for the optimal expected waste. In [5]it is proven that the asymptotic worst case bound ofthe SS algorithm is at most 2.777. In [1] a novel classi-fication scheme is presented for bin packing problems.Classification of the papers and results in fields of re-search are helpful in placing new results in a historicalcontext and in identifying open problems. The papercontains several examples on using the classificationscheme for the known results on the area of bin pack-ing.

SCHEDULING

In [9] the following scheduling problem is investi-gated. There are two sets of identical machines, thejobs have two processing times one for each set of ma-chines. We consider two different objective functions,in the first model the goal is to minimize the maximumof the makespans on the sets, in the second model weminimize the sum of the makespans. We investigatethe online and the offline versions. In the offline casean FPTAS is given for both objective functions. Inthe online case we characterize the competitive ratioof a load greedy algorithm which assigns every job tothe set, where the job has smaller load. The com-petitive ratio of this algorithm tends to ∞ for bothproblems as the ratio m/k grows. We show that thepost greedy algorithm has also unbounded competi-tive ratio as m/k grows. Finally we analyze a modi-fied greedy algorithm and we show that it is constantcompetitive for arbitrary number of machines. Lowerbound for the possible competitive ratios are also pre-sented.

12

Page 14: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

For most scheduling problems the set of machinesis fixed initially and remains unchanged for the dura-tion of the problem. Recently online scheduling prob-lems have been investigated with the modification thatinitially the algorithm possesses no machines, but thatat any point additional machines may be purchased.In all of these models the assumption that each ma-chine has unit cost have been supposed. In [11] weconsider the problem with general machine cost func-tions. Furthermore we also consider a more generalversion of the problem where the available machineshave speed, the algorithm may purchase machineswith speed 1 and machines with speed s. We de-fined and analyzed some algorithms for the solutionof these problems and their special cases. Moreoversome lower bounds on the possible competitive ratiosare presented. In [15] we define and investigate a fur-ther scheduling model. In this new model the numberof machines is not fixed; the algorithm has to purchasethe used machines, moreover the jobs can be rejected.We show that the simple combinations of the algo-rithms used in the area of scheduling with rejectionsand the area of scheduling with machine cost are notconstant - competitive. We present an exponentialtime 2.618-competitive algorithm called OPTCOPY.

STRING ALGORITHMS

In [13] the problem of finding the generalised me-dian string is considered. The generalised medianstring is defined as a string that has the smallest sumof distances to the elements of a given set of strings. Itis a valuable tool in representing a whole set of objectsby a single prototype, and has interesting applicationsin pattern recognition. All algorithms for computinggeneralised median strings known from the literatureare of static nature. That is, they require all elementsof the underlying set of strings to be given when thealgorithm is started. In this paper, we present a novelapproach that is able to operate in a dynamic environ-ment, where there is a steady arrival of new stringsbelonging to the considered set. Rather than com-puting the median from scratch upon arrival of eachnew string, the proposed algorithm needs only the me-dian of the set computed before together with the newstring to compute an updated median string of thenew set. Our approach is experimentally comparedto a greedy algorithm and the set median using bothsynthetic and real data.

SERVER PROBLEMS

We investigated some combinatorial optimizationproblems on routing servers. In [8] we consider a gen-eralized online 2-server problem on the uniform spacein which servers have different costs. Previous work fo-cused on the case where the ratio between these costswas very large. We give results for varying ratios. Forratios below 2.2, we present a best possible algorithmwhich is trackless. We present a general lower boundfor trackless algorithms depending on the cost ratio,proving that our algorithm is the best possible track-less algorithm up to a constant factor for any costratio. The results are extended for the case where wehave two sets of servers with different costs. In [12] werecall the patching technique, which is a basic methodin the area of developing heuristic algorithms for thetraveling salesman problem and its generalization. Wesummarize some known applications and we present anew application of the technique for the p-TSP prob-lem. We demonstrate the efficiency of this application

by probabilistic and empirical analysis.

LEARNING ALGORITHMS

In [7] we investigate the problem of learning theorder of criteria of lexicographic decision under var-ious reasonable assumptions. Although the lexico-graphic decision is very simple, it is the most commonand used decision model in everyday life. Even if thedecision-makers use another model, they translate it(if it is possible) to lexicographic, because for the ver-bal communication only this approach is good. Forlearning the order of criteria we give a sample evalua-tion and an oracle based algorithm. In the worst caseanalysis of the sample evaluation algorithms we aredealing with the adversarial models. We show thatif the distances of the samples are less than 4, thensamples are not learnable, but 4-distance samples arepolynomial learnable.

SURVEYS

We wrote surveys on several areas of the analysisof algorithms. An overview on the results concerningthe area of median strings is given in [14]. A surveyon the basic results competitive analysis of online al-gorithms is published in the book chapter [10]. Thesurveys [2], [3], [4] summarize some parts of the binpacking research field. In [2] the different versions ofclassical one dimensional bin packing and the basicresults are presented. The paper [3] gives an overviewon the area of variable sized bin packing and bin cov-ering. In this models it is not supposed that the sizeof each bin is 1. In [4] the basic results on the per-formance guarantees for one dimensional bin packingare summarized.

ACKNOWLEDGEMENTS

The mentioned research tasks were supported bythe following grants: the Hungarian National Founda-tion for Scientific Research Grant F048587 and GrantT046405.

REFERENCES

[1] E. G. Coffman, J. Csirik A classification schemefor bin packing Acta Cybernetica, (2006) to ap-pear

[2] E. G. Coffman, J. Csirik, Y. T. Leung, Variants ofclassical one dimensional bin packing Approxima-tion algorithms and metaheuristics, Taylor andFrancis Group (2006) to appear

[3] E. G. Coffman, J. Csirik, Y. T. Leung, Variablesized bin packing and bin covering Approxima-tion algorithms and metaheuristics, Taylor andFrancis Group (2006), to appear

[4] E. G. Coffman, J. Csirik, Performance guaran-tees for one dimensional bin packing Approxima-tion algorithms and metaheuristics, Taylor andFrancis Group (2006), to appear

[5] Csirik, D. S. Johnson, C. Kenyon, On the worst-case performance of the sum of squares algorithmfor bin packing DS/0509031, 1 (2005)

[6] J. Csirik, D. S. Johnson, C. Kenyon, J. B. Orlin,P. W. Shor, R. R. Weber, On the sum-of-squaresalgorithm for bin packing Journal of ACM 53: 1(2006) 1–65

[7] J. Dombi, Cs. Imreh, N. Vincze, Learning lexico-graphical order, European Journal on OperationResearch to appear

13

Page 15: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[8] L. Epstein, Cs. Imreh, R. van Stee, More onWeighted Servers or FIFO is better than LRU,Theoretical Computer Science 306, 2003, 305–317.

[9] Cs. Imreh, Scheduling problems on two sets ofidentical machines, Computing, 70, 2003, 277–294,

[10] Cs. Imreh, Competitive analysis (in Hungarian),in Algorithms in Informatics II., ed. A. Ivnyi,(2005), 1350–1383

[11] Cs. Imreh, On-line scheduling with general ma-chine cost functions Electronic Notes in DiscreteMathematics Vol 27, 2006, 49-50

[12] B. Imreh, Cs. Imreh, Sz. Imreh The patchingtechnique and its applications, (in Hungarian),Alkalmazott Matematikai Lapok, 22, 2005, 85–96.

[13] X. Jiang, K. Abegglen, H. Bunke, J. Csirik, Dy-namic computation of generalized median stringsPattern Analysis and Applications 6(3), (2003),185–193.

[14] X. Jiang, H. Bunke, J. Csirik, Median strings: Areview In: Bunke H (ed.) Data mining in TimeSeries Databases, : World Scientific, 2004. 173–192

[15] J. Nagy-Gyorgy, Cs. Imreh, On-line schedulingwith machine cost and rejection, Discrete AppliedMathematics, submitted

III. RESEARCH IN MULTICRITERIADECISION MAKING AND FUZZYLOGIC

A COMMON PREFERENCE MODEL FORVARIOUS DECISION MODELS

Decision-makers use aggregation procedures usingvalue functions or preference relations. However, theaggregation procedure can not be independent fromthe value function or the preference relation. Conjointmeasurement can handle both. The advantage of thismodel is that it gives a general modeling frameworkfor the decision situation. But it does not tell us muchabout how we should make the decision-making. If adecision-maker is facing an aggregation problem hedoesn’t know which aggregation procedure is he goingto use. To choose the MCDM method also seems tobe a multicriteria decision problem. The conclusion isthat a more general framework is needed.

We proposed a general multicriteria decision toolwhich contains the classical procedures (ELECTRE,PROMETHEE, TACTIC, MAUT, Lexicographic de-cision) as special cases. The so-called Bounded Sys-tem is based on the class of nilpotent t-norms ex-tended by hedges and mean and preference operators.With the Bounded System a heterogenous decisionsystem can be built up i.e. on some criteria we canmake a lexicographic decision, on some others we canuse an outranking approach with veto threshold andmaybe on the remaining criteria the utility approach.Our Bounded System is easy to understand and its pa-rameters (weights, thresholds etc.) can also be easilyassessed by a learning algorithm. [1]

THE GENERALIZED DOMBI OPERATOR

The multiplicative utility function is extensivelyused in the theory of multicriteria decision mak-ing. As its generalization a new fuzzy operator

class, the Generalized Dombi operator was introduced,which unites well-known operators of fuzzy theorysuch as min/max, product/algebraic sum, Einstein,Hamacher, Dombi and drastic. Its formula is as fol-lows.

o(α)γ (x) =

1

1 +“

“Qni=1

“1 + γ

“1−xi

xi

”α”− 1

””1/α,

where x ∈ [0, 1]n and γ, α ∈ R. Also, a new form ofthe Hamacher operator was given, which makes multi-argument calculations easier.

We also examined the De Morgan identity whichconnects the conjunctive and disjunctive operators bya negation. It is shown that in some special cases(min/max, drastic and Dombi) the new operator classforms a De Morgan triple with any rational involutivenegation. [2]

REASONING WITH APPROXIMATEDFUZZY INTERVALS

We have investigated the two fundamental ap-proaches to approximate reasoning, the compositionalrule of inference (CRI) and fuzzy truth value basedreasoning. They are common in the sense that theso-called indetermination of the conclusion appears inboth models. We have argued that this phenomenonis acceptable only in the logic view of reasoning, andso it should be avoided regarding the similarity basedview. Sigmoid-like membership functions were intro-duced to avoid the indetermination of the conclusion.The generalized CRI reasoning scheme was investi-gated for all three representative t-norms. Only the�Lukasiewicz t-norm based CRI scheme is not closedunder sigmoid-like functions and from all three, theminimum is the best regarding computational com-plexity. The Membership Driven Inference (MDI) rea-soning scheme was introduced by modifying the min-based CRI on sigmoid-like functions in order to get asimple yet powerful reasoning scheme. It was shownthat it has a series of good properties, it fulfills thegeneralized modus ponens, the generalized modus tol-lens, the generalized chain rule, and more. Also, wehave focused on the efficient computation of the MDIreasoning scheme. The class of squashing functionswas introduced. This class of membership functionscan arbitrarily approximate piecewise-linear member-ships functions of fuzzy sets. Moreover, we have shownthat by using squashing membership functions, theMDI reasoning scheme can be calculated on the pa-rameters of the memberships instead of a pointwisecomputation. This efficient calculation of a rule’s out-put can be applied to approximated trapezoidal andtriangular fuzzy intervals, too, by an LR decomposi-tion of them. [3,4]

ADVANCES IN TYPE-2 FUZZY LOGIC

Fuzzy logic in narrow sense is a generalization ofclassical two-valued logic, it considers a range of truthvalues, usually the unit interval. In recent years, re-search related to type-2 fuzzy logic has become evenmore active than ever. Type-2 fuzzy logic takes thegeneralization a step further by considering truth val-ues that are themselves fuzzy. This means that ev-ery truth value (i.e. every element of [0, 1]) has afuzzy membership degree (which is again an elementof [0, 1]). This mapping from the unit interval to itselfis the truth value, hence its name fuzzy truth value.

14

Page 16: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

We have studied type-2 logical operations (such asconjunctions, disjunctions and implications) on non-interactive fuzzy truth values. Our investigations areintended to provide a theoretical background for type-2 approximate reasoning applications.

Regarding type-2 t-norms and t-conorms (i.e. con-junctions and disjunctions), sufficient conditions weregiven on the continuity of the resultant fuzzy truthvalues. We have shown easy-to-implement point-wise formulas for the type-2 conjunction and disjunc-tion of fuzzy truth values with different monotonic-ity. As an important special case, we considered theextended �Lukasiewicz operations on interactive lin-ear fuzzy truth values. It was shown that the com-putationally complex convolutions of the extended�Lukasiewicz operations are equivalent to simple oper-ations on the parameters on the linear fuzzy truth val-ues. We have given necessary and sufficient conditionswhen these operations preserve continuity and linear-ity. These results can be directly applied to type-2fuzzy systems and also to approximate reasoning sys-tems based on fuzzy truth values.

Our investigations on implications have shownthat type-2 S-implications have similar properties onthe lattice of convex normal fuzzy truth values liketype-1 S-implications on the unit interval. Residualimplications (i.e. residuals of conjunctive operations)are fundamental in fuzzy logic. Type-2 residual im-plications are approached from two distinct views: asextended residual implications of t-norms, and as gen-eral residuated structures. Extended type-2 implica-tions are compared to type-2 S-implications, and itturned out that regarding the lattice of convex nor-mal fuzzy truth values the latter seem more adequatefor approximate reasoning purposes. [5–7]

REFERENCES

[1] J. Dombi. A common preference model for variousdecision models. In B. De Baets and J. Fodor,editors, Principles of Fuzzy Preference Modellingand Decision Making, pages 143–164. AcademiaPress, 2003.

[2] J. Dombi. Towards a general class of operators forfuzzy systems. submitted for publication, 2006.

[3] J. Dombi and Zs. Gera. The approximationof piecewise linear membership functions and�Lukasiewicz operators. Fuzzy Sets and Systems,154:275–286, 2005.

[4] Zs. Gera. Computationally efficient reasoning us-ing approximated fuzzy intervals. Fuzzy Sets andSystems, 158(7):689–703, 2007.

[5] Zs. Gera and J. Dombi. Exact calculations of ex-tended logical operations on fuzzy truth values.submitted for publication.

[6] Zs. Gera and J. Dombi. Type-2 residual implica-tions on non-interactive fuzzy truth values. sub-mitted for publication.

[7] Zs. Gera and J. Dombi. Type-2 s-implications onnon-interactive fuzzy truth values. submitted forpublication.

15

Page 17: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Department of Foundations of Computer Science

THEORETICAL COMPUTER SCIENCE

The research performed in the Department ofFoundations of Computer Science lies in the intersec-tion of algebra, logic and computer science. The mainthemes are automata and formal languages, tree au-tomata and term rewriting, weighted tree automata,logics on words and trees, finite model theory, fixedpoint operators in computer science, and axiomaticquestions.

I. ALGEBRA & LOGIC IN COMPUTERSCIENCE

SEMIRINGS AND SEMIMODULES

In [12], we introduced inductive ∗-semirings as ageneralization of Kozen’s Kleene algebras, We provedthat inductive ∗-semirings are iteration semirings andthey are closed under several algebraic constructions.In [10, 14, 15] we studied semiring-semimodule pairsequipped with a ∗- and ω-operation. We estab-lished several algebraic properties of these structuresand studied several subclasses where the ∗- and ω-operations are defined using a partial order, a com-pletely additive structure and/or an infinite prod-uct. We used these algebraic structures to give anabstract treatment of Buchi-automata and weightedBuchi-automata on infinite words. In [13], we ap-plied these structures to context-free languages overω-words. In [16], we defined algebraically completesemirings as an extension of inductive ∗-semirings.One of the most fundamental nontrivial normal formtheorems for context-free languages is the Greibachnormal form theorem. We established Greibach’s nor-mal form theorem in all algebraically complete semir-ings.

CATEGORICAL ALGEBRAS

In [3], we generalized the notion of partially or-dered algebras to categorical algebras. An importantresult in partially ordered algebras that has many ap-plications in Computer Science is that each orderedalgebra can be completed into a continuous orderedalgebra preserving all valid inequalities. We extendedthis result to categorical algebras and discussed sev-eral applications in Computer Science.

REGULAR WORDS

Regular words were introduced by Courcelle in thelate 70’s. His motivation came from recursive programschemes. They were subsequently studied by Thomasand Heilbrunner. Courcelle raised several importantproblems regarding the equational axiomatization ofregular words and the decidability of the equationaltheory. Courcelle’s questions for axiomatization werecompletely solved in [1, 2]. We also gave a P-time al-gorithm to decide the equational theory. This greatlyimproves an earlier algorithm of Thomas with no ex-plicit upper bound for its complexity.

AXIOMATIC THEORY OF AUTOMATA

In [11], we gave an introduction to the axiomatictheory of automata and languages developed earlierby Conway, Bloom, Esik and Kuich.

LOGIC ON WORDS

Linear temporal logic has the same expressivepower as aperiodic automata. In order to be ableto express modular counting and other properties ofwords, Wolper introduced Extended Linear Tempo-ral Logic. In [7], we bridged Wolper’s logic andthe Krohn-Rhodes decomposition theory of finite au-tomata and gave an algebraic characterization ofWolper’s logic.

LOGIC ON TREES

Temporal logics can be classified into linear timeand branching time logics. The latter logics canbe viewed as logics on trees. Important branchingtime logics are CTL (Computational Tree Logic) andCTL∗. In both logics, one can define only regularproperties. However, it is an open problem to give adecidable characterization of those regular properties(given by a finite tree automaton) definable in theselogics. An algebraic approach to deal with this andrelated problems in formal logic has been developedin the papers [4–6, 8, 9] using pseudovarieties of finitealgebras and the cascade product (wreath product).The method developed in these papers reduces thecharacterization of the expressive power to the mem-bership problem in pseudovarieties of finite algebras.

ACKNOWLEDGEMENTS

The above research has been supported bythe grants 53ou1 and 60ou12 of the Austrian-Hungarian Action Found, the grant T046686 of theNational Foundation of Hungary for Scientific Re-search (OTKA), and the ESF Research Network AU-TOMATHA.

REFERENCES

[1] S. L. Bloom and Z. Esik. Axiomatizing omegaand omega-op power on words, Theoretical In-formatics and Applications, 38(2004), 3–18.

[2] S. L. Bloom and Z. Esik. The equational theoryof regular words, Information and Computation,197(2005), 55–89.

[3] S. L. Bloom and Z. Esik. Completing Categori-cal Algebras, Proc. Fourth IFIP Conf. Theoreti-cal Computer Science TCS-2006, Springer, 2006,231–250.

[4] Z. Esik. An algebraic characterization of the ex-pressive power of temporal logics on finite trees,Part 1, Proc. 1st International Conference on Al-gebraic Informatics, Aristotle University of Thes-saloniki, 2005, 53–78.

[5] Z. Esik. An algebraic characterization of the ex-pressive power of temporal logics on finite trees,Part 2, Proc. 1st International Conference on Al-gebraic Informatics, Aristotle University of Thes-saloniki, 2005, 79–100.

[6] Z. Esik. An algebraic characterization of the ex-pressive power of temporal logics on finite trees,Part 3, Proc. 1st International Conference on Al-gebraic Informatics, Aristotle University of Thes-saloniki, 2005, 101–110.

16

Page 18: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[7] Z. Esik. A note on Wolper’s logic, Proc. Work-shop on Semigroups and Automata, Lisboa, 2005,electronic.

[8] Z. Esik. Characterizing CTL-like Logics on FiniteTrees, Theoretical Computer Science, 356(2006),136–152.

[9] Z. Esik. Cascade Products and Temporal Logicson Finite Trees, Electronic Notes in TheoreticalComputer Science, 162(2006), 163–166.

[10] Z. Esik and W. Kuich. An algebraic generaliza-tion of omega-regular languages, Proc. MFCS 04,LNCS 3153, Springer, 2004, 648–659.

[11] Z. Esik and W. Kuich. Equational Axioms for aTheory of Automata, Formal Languages and Ap-plications, Studies in Fuzziness and Soft Com-puting 148, Carlos Martin-Vide, Victor Mitrana,Gheorghe Paun (Eds.), Springer, 2004, 183–196.

[12] Z. Esik and W. Kuich. Inductive ∗-semirings,Theoretical Computer Science, 324(2004), 3–33.

[13] Z. Esik and W. Kuich. A semiring-semimodulegeneralization of ω-context-free languages, The-ory is Forever, LNCS 3113, Springer, 2004, 68–80.

[14] Z. Esik and W. Kuich. A semiring-semimodulegeneralization of ω-regular languages, Part 1,J. Automata, languages, and Combinatorics,10(2005), 203–242.

[15] Z. Esik and W. Kuich. A semiring-semimodulegeneralization of ω-regular languages, Part 2,J. Automata, languages, and Combinatorics,10(2005), 243–264.

[16] Z. Esik, H. Leiss. Algebraically complete semir-ings and Greibach normal form, Annals of Pureand Applied Logic, 103(2005), 173-203.

II. AUTOMATA AND FORMAL LAN-GUAGES

WEIGHTED TREE AUTOMATA

In [1], we proved a general Kleene theorem ap-plicable to weighted tree automata and formal powerseries over trees, finite or infinite. In [5] we gave asurvey of results on weighted tree automata and treetransducers. In [4], we studied fuzzy subsets of alge-bras including algebras of trees and established a tripleequivalence between equational, rational and recog-nizable fuzzy sets.

In [2] we showed that the cost-finiteness of tree au-tomata with costs over finitely factorizing and mono-tonic semirings is decidable. We showed that it is alsodecidable whether a tree automaton with costs over afinitely factorizing, monotonic, and naturally orderedsemiring is bounded with respect to the natural order.

In [18], we compared the classes of tree serieswhich are recognizable by (a) multilinear mappingsover some finite dimensional K-vector space, where Kis a field, (b) K-Σ-tree automata, where K is a com-mutative semiring, (c) weighted tree automata overK, where K is a semiring, (d) finite, polynomial treeautomata over K, where K is a commutative and con-tinuous semiring, (e) polynomially-weighted tree au-tomata, where K is a semiring, and (f) weighted treeautomata over M-monoids.

TREE SERIES TRANSDUCERS

The first definition of the semantics of a tree seriestransducer, called algebraic semantics, is based on atree series substitution that does not take into accountthe number of the occurrences of the substitution vari-ables. In [16] we introduced tree series transducers ofwhich the semantics takes into account that number.We compared the computation power of the two mod-els.

In [17] we defined a tree series transducer modelwith an operational style semantics and called thismodel weighted tree transducer. We showed thattree series transducers with algebraic semantics andweighted tree transducers are semantically equivalent.

In [11] we generalized the famous tree transducerhierarchy of J. Engelfriet for tree series transducersover commutative, idempotent and positive semirings.

ALGEBRAIC PROPERTIES OF REGULARTREE LANGUAGES

In [3], we showed that regular tree languages canbe axiomatized by a few simple equations and the leastfixed point rule. This extends a result of Kozen fromwords to trees. In [8], we introduced a new algebraicframework for the study of varieties of tree languagesin relation to logic.

MULTI BOTTOM-UP TREE TRANSDUC-ERS

In [12] we defined deterministic multi bottom-uptree transducers and showed that they are seman-tically equivalent with deterministic top-down treetransducers with regular look-ahead. Then in [13] wecompared the computation power of linear determin-istic multi bottom-up tree transducers and eight well-known classes of deterministic bottom-up and deter-ministic top-down tree transducers.

SHAPE PRESERVING TREE TRANSDUC-ERS

Shape-preserving tree transducers generalizelength-preserving sequential machines. In [10]we showed that shape-preserving top-down treetransducers are equivalent to finite-state relabelings.Moreover, we proved that it is decidable if a top-downtree transducer is shape preserving. In [20] it wasproved that shape-preserving bottom-up tree trans-ducers are also equivalent to finite-state relabelings.The decidability of the shape-preserving property forbottom-up tree transducers was proved in [21].

PEBBLE TREE TRANSDUCERS

In [14, 15], we investigated pebble tree transduc-ers and macro pebble tree transducers. We showedthat the circularity problem and the strong circularityproblem for pebble tree transducers is decidable andthat the weak circularity problem for pebble macrotree transducers is decidable. Moreover, we provedseveral decomposition results for macro pebble treetransducers.

In [22], n-pebble tree-walking automata with al-ternation were defined. It was shown that tree lan-guages recognized by these devices are exactly theregular tree languages. Then it was shown that thedeterministic and noncircular pebble alternating tree-walking automata are strictly less powerful than theirnondeterministic counterparts.

17

Page 19: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

STORAGE-TO-TREE TRANSDUCERS

In [19] it was shown that the class of tree trans-formations induced by regular storage-to-tree trans-ducers with positive look-ahead is equal to the com-position of the class of transformations induced byregular storage-to-tree transducers with the class oflinear homomorphisms. It was also proved that theclasses of transformations induced by both IO and OIcontext-free-storage-to-tree transducers are closed un-der positive look-ahead and composition with linearhomomorphisms.

TREE AUTOMATA AND TERM REWRITESYSTEMS

In [27] several characterizations and decidabilityresults were obtained for ground tree transformationsand congruence relations induced by tree automata.

TERM REWRITE SYSTEMS PRESERVINGRECOGNIZABILITY

Salomaa showed that linear monadic term rewritesystems effectively preserve recognizability. We [31]showed that there are finitely many descendants ofany recognizable tree language L for all linear monadicterm rewrite systems, and we gave these descen-dants through finitely many linear monadic termrewrite systems. We [29] showed that right-linear half-monadic term rewrite systems effectively preserve rec-ognizability. Using this property, we [29] showed thattermination and convergence are decidable propertiesfor right-linear half-monadic term rewrite systems.

GROUND TERM REWRITING

We [28] showed that for any given finitely gener-ated congruences ρ and τ over the term algebra, it isdecidable if the intersection of ρ and τ is a finitely gen-erated congruence. If the answer is yes, then we caneffectively construct a finite relation U over groundterms such that the congruence closure of U is equalto the intersection of ρ and τ .

We [30] showed that for a given left-linear right-ground term rewrite system R it is decidable if there isa ground term rewrite system S such that the restric-tion of the rewriting relation of R to ground terms isequal to the rewriting relation of S. If the answer isyes, then one can effectively construct such a groundterm rewrite system S.

HIGHER DIMENSIONAL AUTOMATA

In [6], we defined parenthesizing automata, thatoperates on higher dimensional words (i.e., on ele-ments of free algebras with several independent as-sociative operations). We have extended several basicresults of the classical theory of automata to parenthe-sizing automata including the equivalence to algebraicrecognizability and monadic-second order definability.In [7], we described infinite higher dimensional wordsin algebraic frameworks and gave graph-theoretic de-scriptions of them. Based on these results parenthesiz-ing Buchi-automata was defined with generalization ofthe above mentioned classical results [24,25]. In [23],it was shown that the classes of languages that can beaccepted by parenthesizing automata with at most ipairs of parentheses form a strict hierarchy, for i ≥ 0.The aim of [26] is to relate parenthesizing automata tothe work of Hashiguchi, Ichihara and Jimbo on binoidlanguages.

OTHER

In [9] we gave a short introduction to tree trans-ducers for those who just would like to get an insightinto the field.

ACKNOWLEDGEMENTS

The above research has been supported by thegrants 53ou1 and 60ou12 of the Austrian-HungarianAction Found, the grants 36/2005 and 45/2002 of theDeutsche Akademische Austauch Dienst (DAAD) and

the Hungarian Scholarship Committee (MOB), thegrants T046686 and T030084 of the National Foun-dation of Hungary for Scientific Research (OTKA),and a Szechenyi Istvan Scholarship of the HungarianMinistry of Education.

REFERENCES

[1] S. L. Bloom and Z. Esik. An Extension Theo-rem with an Application to Formal Tree Series,J. of Automata, Languages and Combinatorics8(2003), 145–185.

[2] B. Borchardt, Z. Fulop, Z. Gazdag, and A.Maletti. Bounds for Tree Automata with Polyno-mial Costs, J. of Automata, Languages and Com-binatorics, 10(2005), 107–157.

[3] Z. Esik. Axiomatizing the equational theory ofregular tree languages, J. Logic and AlgebraicProgramming, to appear.

[4] Z. Esik and L. Gwangu. Fuzzy Tree Auotomata,Fuzzy Sets and Systems, to appear.

[5] Z. Esik and W. Kuich. Formal Tree Series,J. of Automata, Languages and Combinatorics8(2003), 219–285.

[6] Z. Esik and Z. L. Nemeth. Higher dimensionalautomata, J. of Automata, Languages and Com-binatorics., 9(2004), 3–29.

[7] Z. Esik and Z. L. Nemeth. Algebraic and graph-theoretic properties of infinite n-posets, Theoret-ical Informatics and Applications, 39(2005), 305–322.

[8] Z. Esik and P. Weil. Algebraic recognizabilityof regular tree languages, Theoretical ComputerScience, 340(2005), 291–321.

[9] Z. Fulop. An Introduction to Tree Transducers,Formal Methods in Computing (Eds. M. Ferenczi,A. Pataricza and L. Ronyai), Akademiai KiadoBudapest, 2005, 199–258.

[10] Z. Fulop and Zs. Gazdag. Shape Preserving Top-Down Tree Transducers, Theoretical ComputerScience, 304(2003), 315–339.

[11] Z. Fulop, Zs. Gazdag, and H. Vogler. Hierarchiesof Tree Series Transformations, Theoretical Com-puter Science, 314(2004), 387–429.

[12] Z. Fulop, A. Kuehnemann, and H. Vogler. Abottom-up characterization of deterministic top-down tree transducers with regular look-ahead,Information Processing Letters, 91(2004), 57–67.

[13] Z. Fulop, A. Kuehnemann, and H. Vogler. Lin-ear Deterministic Multi Bottom-up Tree Trans-ducers, Theoretical Computer Science, 347(2005),275–287.

18

Page 20: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[14] Z. Fulop and L. Muzamel. Recent Results on Peb-ble Macro Tree Transducers, Proc. of the 1st In-ternational Conference on Algebraic Informatics,Thessaloniki, 2005, 281–284.

[15] Z. Fulop and L. Muzamel. Circularity, Com-position, and Decomposition Results for PebbleMacro Tree Transducers, J. of Automata, Lan-guages and Combinatorics, to appear.

[16] Z. Fulop and H. Vogler. Tree Series Transforma-tions that Respect Copying, Theory of Comput-ing Systems, 36(2003), 247–293.

[17] Z. Fulop and H. Vogler. Weighted Tree Trans-ducers, J. of Automata, Languages and Combi-natorics, 9(2004), 31–54.

[18] Z. Fulop and H. Vogler. A Comparison of SeveralModels of Weighted Tree Automata, TechnicalReport, Technical University of Dresden, Facultyof Informatics, TUD-FI06-08, 2006.

[19] T. Hornung and S. Vagvolgyi. Storage-to-treetransducers with look-ahead, Theoretical Com-puter Science, 329(2004), 115–158.

[20] Zs. Gazdag. Shape Preserving Bottom-up TreeTransducers, J. of Automata, Languages andCombinatorics, 10(2005), 483–534.

[21] Zs. Gazdag. Decidability of the Shape Preserv-ing Property of Bottom-Up Tree Transducers, In-ternational Journal of Foundations of ComputerScience, 17(2006), 395-413.

[22] L. Muzamel. Pebble Alternating Tree-WalkingAutomata and Their Recognizing Power, ActaCybernetica, to appear.

[23] Z. L. Nemeth. A hierarchy theorem for regularlanguages over free bisemigroups, Acta Cybernet-ica, 16(2004), 567–577.

[24] Z. L. Nemeth. Automata on infinite biposets,Proc. Automata and Formal Languages, 11th Int.Conf., AFL 2005, Szeged, 2005, 213–226.

[25] Z. L. Nemeth. Automata on infinite biposets,Acta Cybernetica, 18(2006), 765–797.

[26] Z. L. Nemeth. On the regularity of binoid lan-guages: A comparative approach, Preproc. 1stInternational Conference on Language and Au-tomata Theory and Applications, LATA 2007,Tarragona, 2007, to appear.

[27] S. Vagvolgyi. On Ground Tree Transformationsand Congruences Induced by Tree automata,Theoretical Computer Science, 304(2003), 449–459.

[28] S. Vagvolgyi. Intersection of Finitely Gener-ated Congruences over Term Algebra, TheoreticalComputer Science, 300(2003), 209–234.

[29] S. Vagvolgyi. Right-Linear Half-Monadic TermRewrite Systems, Theoretical Computer Science,309(2003), 195–211.

[30] S. Vagvolgyi. Term Rewriting Restricted toGround Terms, Theoretical Computer Science,302(2003), 135–165.

[31] S. Vagvolgyi. Descendants of a recognizable treelanguage for sets of linear monadic term rewriterules, Information Processing Letters, 99(2006),111-118.

OTHER ACTIVITIES

I. EDITED BOOKS

In the period 2003–3006, the members of the Depart-ment of Foundations of Computer Science edited orco-edited the following books and special journal is-sues.

1. AFL 05, Special Issue of Acta Cybernetica, Vol-ume 17, Number 4, 2006.

2. Automata and Formal Languages, Special Issueof Theoretical Computer Science, Volume 366,Number 3, 2006.

3. Recent Advances in Formal Languages and Ap-plications, Studies in Computational Intelli-gence 25, Springer-Verlag, 2006.

4. Computer Science Logic, Proceedings of CSL2006, LNCS 4207, Springer-Verlag, 2006.

5. Automata and Formal Languages, Proceedingsof the 11th International Conference, AFL 2005,Dobogoko, May 17–20, 2005.

6. Process Algebra, Special Issue of TheoreticalComputer Science, Volume 335, Number 2-3,2005.

7. Proceedings of the 4th Conference for PhD Stu-dents, CSCS 2004, Special Issue of Acta Cyber-netica, Volume 17, Number 2, 2005.

8. Developments in Language Theory, DLT 2003,Special Issue of Theoretical Computer Science,Volume 327, Number 3, 2004.

9. Fixed Points in Computer Science 03, Warsaw,Special Issue of Theoretical Informatics and Ap-plications, Volume 38, Number 4, 2004.

10. Fixed Points in Computer Science 02, Copen-hagen, Special Issue of Theoretical Informaticsand Applications, Volume 37, 271–391, 2003.

11. Process algebra: Open problems and futuredirections, PA’03, Bologna, Italy, July 21–25,2003, BRICS Notes Series NS-03-3, 2003.

12. Developments in Language Theory, Proceedingsof the 7th International Conference, DLT 2003,LNCS 2710, Springer, 2003.

13. Proceedings of the 3rd Conference for PhD Stu-dents, CSCS 2002, Special Issue of Acta Cyber-netica, Volume 16, Number 2, 2003.

II. ORGANIZED CONFERENCES

In the period 2003–3006 the Department of Founda-tions of Computer Science has organized the followingconferences and workshops:

1. Computer Science Logic, CSL 2006, Szeged,Hungary, September 25–29, 2006.

2. Logic and Combinatorics, Satellite Workshop ofCSL 2006, Szeged, Hungary, September 23–24,2006.

3. Algebraic Theory of Automata and Logic,Satellite Workshop of CSL 2006, Szeged, Hun-gary, September 30 and October 1, 2006.

4. Automata and Formal Languages, 11th Interna-tional Conference, AFL 2005, Dobogoko, Hun-gary, May 17–20, 2005.

5. Developments in Language Theory, 7th Interna-tional Conference, DLT 2003, Szeged, Hungary,July 7–11, 2003.

19

Page 21: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Department of Image Processing and Computer Graphics

I. MEDICAL AND NEUTRON TOMOG-RAPHY APPLICATIONS OF AN AUTO-MATIC REGISTRATION METHOD

Registration is a fundamental task in image process-ing. Its purpose is to find a geometrical transforma-tion that relates the points of an image to their corre-sponding points of another image. Many registrationalgorithms have been proposed in the past decade.Automatic methods become more and more populardue to their convenient usability and with the com-puting power of today’s computers the running time isacceptable for many applications. We have developeda fast, fully automatic algorithm that is capable ofsolving linear registration of 2D and 3D images of dif-ferent sources. For medical images, we joined the Ret-rospective Registration Evaluation Project conductedby Vanderbilt University, USA. We also applied themethod to register 2D neutron tomography imageswith success. The evaluations show that our methodhas the potential to produce satisfactory results, butvisual inspection is necessary to guard against largeerrors.

II. REGISTRATION METHOD

First we describe the fully automatic, iterative regis-tration method that is capable of finding linear trans-formations to align images from the same or differentmodalities (i.e., taken by the same or different imagingdevices).

We follow the notations of [4]. Let X denote theobject to be imaged, and let A and B be 3D imagesof X taken by the same or different imaging devices.The images usually have different fields of view, thusthe domains ΩA and ΩB will be different. A(xA) andB(xB) are referred to as the intensity values at spa-tial positions xA and xB, respectively. Intensity valuesrepresent some kind of measurement of the materialin spatial positions of X, such as attenuation of X-ray beams in case of Computed Tomography (CT),changes in states of protons under changing the mag-netic field properties in Magnetic Resonance Imag-ing (MRI), or distribution of nuclear tracers in caseof Positron Emission Tomography (PET) and SinglePhoton Emission Computed Tomography (SPECT).

As the images A and B represent the same objectX, there is a relation between the spatial locationsin A and B: position x ∈ X is mapped to xA inimage A, and to xB in image B. The registrationprocess involves recovering the spatial transformationT which maps xB to xA over the entire domain ofinterest, which can be the entire domain of image Aor the overlapping portion of the domains.

The medical images are discrete, they sample theobject at a finite number of points. Sample spacingcan be different for different images. These grid po-sitions and the corresponding sample values togetherare referred to as voxels.

For any given T , the intersection of discrete do-mains ΩA and ΩB might be the empty set, when nosample points will exactly overlap. To overcome this,

we have to resample image intensities of image Bin ΩA. The simplest resampling method is to selectthe intensity value of the closest grid position of ΩB .

Linear or more complex interpolation methods(cubic spline, B-Spline, Sinc) can also be used. LetT denote the transformation that maps both the po-sition and the associated intensity value at that posi-tion, and BT the resampled image B.

The selection of the similarity measure is probablythe most crucial part of a registration algorithm. Weneed a function which optimally has one global op-timum at perfect alignment, has no local optimums,and is ”smooth enough” to find this optimum fast.Practically it is very hard, or even impossible to findsuch a similarity measure, especially when the imagesare taken by different imaging devices. Many similar-ity measures were proposed in the past decade. Wechose the measures based on the mutual informationof the images proposed by Collignon et al. [3] and Vi-ola and Wells [11, 12], and on the normalized mutualinformation of the images proposed by Studholme etal [8].

Both measures utilize the entropy of image A,

H(A) = −X

a

pTA(a) · log pT

A(a),

the entropy of image B,

H(B) = −X

b

pTB(b) · log pTB(b),

and the joint entropy of images A and B,

H(A,B) = −X

a

Xb

pTAB(a, b) · log pTAB(a, b),

where pA and pB are the histograms, and pAB is theco-occurrence matrix of the intensity values of imagesA and B.

Mutual information is computed as

MI(A,B) = H(A) +H(B)−H(A,B),

and the normalized mutual information as

NMI(A,B) =H(A) +H(B)

H(A,B).

We found that when mutual information is calcu-lated over the overlapping domain ΩT

A,B , the failurerate is high [8]. We decided to use the whole ΩA in-stead, in case of this measure, which solved the prob-lem.

To speed up the registration process and to avoidfalling into a local optimum, we use the Gaussian mul-tiresolution pyramid representation of the images [1].The search starts at the coarsest level. When an op-timum is found, the result is propagated to the next,finer level. We use Powell’s direction set, iterative,nonlinear optimization algorithm to find the optimumof the similarity measure [7]. Further optimizations ofthe algorithm can be found in [9].

20

Page 22: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

III. EVALUATION OF MR–CT AND MR–PET REGISTRATION

It is necessary to measure the quality of alignmentto be able to decide whether a registration algorithmis suitable for solving a given registration problem.The alignment need not be perfect, but the error mustbe below a certain (application dependent) threshold.The similarity measure cannot be used to judge this,since it is not guaranteed that it reaches its globaloptimum at perfect alignment. An other method, vi-sual inspection is generally applicable. Although vi-sual inspection is always necessary since the automaticmethods occassionally might fall into a nonglobal op-timum producing a bad result without any warnings,a more accurate evulation procedure based on somekind of measurements is necessary. An overview ofsuch procedures can be found in [4].

To evaluate our registration method, we joinedthe Retrospective Registration Evaluation Project ofVanderbilt University, USA in 1999 [13]. The objec-tive of that project was to perform blinded evaluationof retrospective image registration techniques usinga prospective, marker-based registration method as agold standard. A gold standard is a system whoseaccuracy is known to be high. A fiducial marker sys-tem can serve as an excellent gold standard for rigidregistration, since some of these systems can providesubmillimetric accuracy. The primary disadvantage isthe high invasiveness i.e., bone-implanted markers [6].In order to ensure blindness, all retrospective regis-trations were performed by participants who had noknowledge of the gold-standard until after their resultshad been submitted.

The evaluation followed these steps. Image vol-umes of three modalities: X-ray computed tomog-raphy (CT), magnetic resonance (MR), and positronemission tomography (PET) were obtained from pa-tients undergoing neurosurgery at Vanderbilt Univer-sity Medical Center, on whom bone-implanted mark-ers were mounted. These volumes had all traces of themarkers removed and were provided to project collab-orators outside Vanderbilt, who then performed reg-istration on the volumes. The investigators communi-cated their results to Vanderbilt, where the accuracyof each registration was evaluated.

Two registration tasks were evaluated: CT to MRand PET to MR, and these tasks were broken intosubtasks according to the type of MR and to whetheror not the MR image was corrected (rectified) for ge-ometrical distortion. The image data set of nine pa-tients were used, seven of which contained both CTand MR, and seven with both PET and MR.

The results of the project were published in [13]and [14]. Since we joined the project later, our resultswere not included in those papers, thus we comparedour results against those evaluated earlier [9].

Before the evaluation of our results, we visuallyinspected the quality of registration. Using the NMImethod, all registration results were visually accept-able. In case of mutual information, for the CT toMR task, all 41 results were visually acceptable. Incase of PET to MR, for five image pairs the resultsof registration was visually misregistered. The other30 results were visually acceptable. In spite of theseclear misregistrations, all results were submitted forevaluation to Vanderbilt University. Figure 5 showthe result of a MR–CT registration problem.

The results show that in case of CT to MR reg-

Figure 5. Fusion of the CT to MR registration prob-lem for Patinet #5, before (top) and after (bottom)registration. CT data is shown in red, MR data ingreen color.

istration task, both of our methods produce accept-able results. Our MI method ranks high, the NMImethod produces average results. For PET to MRproblems, the MI method tends to fail (five failures outof 35 cases), and produces average results. The NMImethod gives stable results and ranks high among thecompeting algorithms. The running time was about30-120 seconds on a 800 Mhz Pentium-III PC. Moredetailed results of the evaluation of our methods canbe found athttp://www.vuse.vanderbilt.edu/~image.

IV. APPLICATION OF AUTOMATICREGISTRATION IN SEGMENTINGORGANS OF THE PELVIC REGION

In a cooperation with General Electric Medical Sys-tems Hungary, the algorithm had been modified tosolve pelvic CT–CT registration problems of differentpatients. When segmenting organs of the pelvic re-gion, transforming (or registering) CT studies of dif-ferent patients to a common reference frame can beused in two preprocessing tasks:

• Generating a probability atlas, or a deformableorgan model (model creation),

• and in the clinical application, establishingthe voxel-to-voxel correspondence between thestudy to be segmented and the probability atlasor model (initial organ placement).

In these cases precise alignment of all anatomicalstructures is not crucial, the focus is on proper align-ment of the pubic bone area and fast execution.

Studies are registered against a previously selectedsuitable reference study. The modified algorithm con-sists of two steps. First, a global nine degree of free-dom transformation (three rotation, three scale, andthree translation) is to be found. Then this is locallyrefined in the pubic bone area, modifying six of the pa-rameters (three rotation and three translation). The

21

Page 23: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

local neighbourhood of the pubic bone area is selectedmanually for the reference study only, as a preprocess-ing step.

It has been shown that after the refinement step,prostate regions are significantly (P < 0.05 usingStudent t-test) closer to each other [10]. The studydatabase was provided by General Electric MedicalSystems and consisted of 26 CT images with expertsegmented “gold-standard” prostate and bladder re-gions. The failure rate was low (three out of 26), eventhough many of the studies were distorted by artificialmetallic objects or not satisfying the assumed proto-col. The running time is 20–40 seconds using a 3 GhzPentium IV desktop PC. It is possible to make it evenfaster by removing the unnecessary image regions (theborder around the patient) of the reference study.

V. APPLICATION OF IMAGE REGIS-TRATION IN NEUTRON TOMOGRA-PHY

We could use the registration algorithm in an interest-ing, non-medical problem [2,5]. Using neutron radio-graphy, the inner regions of object made from metal,copper, or aluminum can be inspected, which is moreuseable than using conventional X-ray techniques dueto their much lower contast properties. Similarly to X-ray, a neutron ray is passing through the inspected ob-ject while it is attenuated more or less according to theobject properties. An imaging plate is placed at theback of the inspected object which detects the inten-sity of the passed ray. By rotating the object aroundits axis, a set of 2D projections is generated. Usingdiscrete or conventional tomography algorithms, a 3Dmodel of the object can be obtained.

The imaging process consists of the followingsteps. The object is placed on a table which can berotated around by a given angle after the 2D image istaken. At the back of the object a rail track is situ-ated, in which the casing of the imaging plate can bemoved. After an image is taken, the casing is removed,the imaging plate is taken out of the casing and theimage data is read. After deleting the contents of theimaging plate, it is put back into the casing and movedto the back of the object using the rail track.

The way the images are taken introduces geomet-ric differences between the consecutive projections. Itmeans that the same projection directions from thesource might pass the imaging plate at different pixellocations. Such geometric differences can degrade theresult of the reconstruction. The task of the imageregistration algorithm is to recover these geometricdifferences.

If we take a closer look at the way the imagesare taken, we can conclude that placing the casing inand out cannot produce significant errors. The railtrack provides one way motion only, and an immobilebumper stops the casing precisely enough. The mainsource of error is the moving of the imaging plate inand out from the casing. To track these movings, ex-ternal markers attached to the casing are applied, theprojections of which are visible in the top, bottom, leftand right hand side of the images. Since the imagingplate moves with respect to these markers, we can ex-pect that when the markers are aligned, the imagedata is suitable for reconstruction.

It is assumed that a rigid-body transformation(translation along the axes and rotation about thecenter of the image) can align the images. The reg-

istration algorithm utilizes the normalized version ofmutual information as pixel similarity measure. Oneof the projection images is selected as the referenceimage and the others are registered against it one byone. Although the algorithm is fully automatic, a pre-processing step is necessary. The center region of theimages, where the projection of the object is visiblemust be masked out and the similarity measure isevaluated only outside of it. This mask selection isnecessary only for the reference image. The result ofthe preprocessing step is shown in Figure 6.

Figure 6. A 2D projection image of a gas pressure reg-ulator (top) and the manually selected masked region(bottom).

The running time is around 90–120 seconds forimages of size 5000 × 4000 pixels. Visual inspectionconfirmed that the registration provided acceptableresults, the markers align reasonably well and the re-sult can be used for tomographic reconstruction. Wecan expect further improvements in precision if themarkers were attached to the rail track instead of thecasing.

VI. CONCLUSIONS

In this paper we summarized our experiments using anautomatic, voxel-similarity based registration methodfor medical and non-medical problems. We can con-clude that voxel-similarity measures, in our case theones based on mutual information, can be success-fully applied to align multimodal medical images andneutron tomography images also. Although the regis-tration itself is fully automatic, in some cases manualselection of masked out regions is required as a prepro-cessing step. Especially when aligning neutron tomog-raphy images using external markers, other solutionscould also be considered by detecting those markersand aligning the extracted geometric features. Suchan approach could work without any preprocessingsteps and could be much faster than the approach weused. The problem of such an approach is that it re-quires special programming and it would require much

22

Page 24: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

more development time. When the running time isnot crucial, our automatic approach is able to solvethe problem without any severe modifications.

ACKNOWLEDGEMENTS

We are grateful for the help we received from Pro-fessor Fitzpatrick, Jay West and Ramya Balachandranfrom the Vanderbilt University in evaluating our regis-tration results. The images and the standard transfor-mations were provided as part of the project, ”Evalu-ation of Retrospective Image Registration”, NationalInstitutes of Health, Project Number 1 R01 NS33926-01, Principal Investigator, J. Michael Fitzpatrick,Vanderbilt University, Nashville, TN. Parts of ourwork have been funded by OTKA T023804, FKFP0908/1999 and OTKA T048476 grants.

REFERENCES

[1] P. J. Burt and E. H. Adelson. The laplacian pyra-mid as a compact code. IEEE Transactions onCommunications, 31:532–540, 1983.

[2] M. Balasko, A. Kuba, A. Nagy, A. Tanacs, andB. Schillinger. Comparison Radiography and To-mography Possibilities of FMR-2 (20 MW) andBudapest (10 MW) Research Reactors. In Pro-ceedings of WCNR-8, page 4, 2006.

[3] A. Collignon, F. Maes, D. Delaere, D. Vander-meulen, P. Suetens, and G. Marchal. Automatedmulti-modality image registration based on in-formation theory. In Proceedings of InformationProcessing in Medical Imaging, pages 263–274,1995.

[4] J. V. Hajnal, D. L. G. Hill, and D. J. Hawkes.Medical Image Registration. CRC Press, Read-ing, Massachusetts, 2001.

[5] Z. Kiss, L. Rodek, and A. Kuba. Image recon-struction and correction methods in neutron andX-ray tomography. Acta Cybernetica, 17:557–587, 2006.

[6] C. R. Maurer, J. M. Fitzpatrick, M. Y. Wang,R. L. Galloway, R. J. Maciunas, and G. S. Allen.Registration of head volume images using im-plantable fiducial markers. IEEE Transaction onMedical Imaging, 16:447–462, 1997.

[7] W. H. Press, S. A. Teukolsky, W. T. Vetterling,and B. P. Flannery. Numerical Recipes in C: TheArt of Scientific Computing. Cambridge Univer-sity Press, New York, NY, 2nd edition, 1992.

[8] C. Studholme, D. L. G. Hill, and D. J. Hawkes.An overlap invariant entropy measure of 3D med-ical image alignment. Pattern Recognition, 32(1):71–86, 1999.

[9] A. Tanacs and A. Kuba. Evaluation of a fullyautomatic medical image registration algorithmbased on mutual information. Acta Cybernetica,16:327–336, 2003.

[10] A. Tanacs, E. Mate, and A. Kuba. Application ofAutomatic Image Registration in a SegmentationFramework for Pelvic CT Images In Conferenceon Computer Analysis of Images and Patterns(CAIP2005), Lecture Notes in Computer Science3691, pages 628–635, Springer Verlag, 2005.

[11] P. Viola and W. M. Wells III. Alignment by maxi-mization of mutual information. In Proceedings ofIEEE International Conference on Computer Vi-sion, pages 16–23, Los Alamitos, CA, Jun. 1995.

[12] W.M. Wells, P. Viola, H. Atsumi, S. Nakajima,and R. Kikinis. Multi-modal volume regsitrationby maximization of mutual information. MedicalImage Analysis, 1(1):35–51, 1996.

[13] J. B. West, J. M. Fitzpatrick, and et al. Compar-ison and evaluation of retrospective intermodal-ity brain image registration techniques. Journalof Computer Assisted Tomography, 21:554–566,1997.

[14] J. B. West and et al. Retrospective intermodal-ity registration techniques for images of the head:Surface-based versus volume-based. IEEE Trans-action on Medical Imaging, 18(2):144–150, 1999.

VII. DISCRETE TOMOGRAPHY

Discrete Tomography (DT) deals with the reconstruc-tion of discrete valued functions from their line inte-grals along certain directions called projections. Thefunction itself usually represents a two-dimensionalcross-section of an object consisting of a small num-ber of homogeneous materials, while the projectionscan be regarded as the results of some imaging meth-ods (like, e.g., X-ray, gamma, or neutron imaging).Typical applications arise in non-destructing testing ofindustrial parts, investigating of crystalline or macro-molecule structures with electron microscopy or exam-ining the shape of blood vessels and heart chambersin human body with angiography. In all of these ap-plications there is a strong reason that restricts thenumber of available projections to at most about 10(often only 2 or 4). This usually yields ambiguousreconstruction, i.e., the result image of a classical re-construction method can be quite dissimilar to theoriginal one. Another problem is that the reconstruc-tion problem is in most cases NP-hard. Therefore, inDT more sophisticated methods are needed that canguarantee accurate and fast reconstruction despite thefact that there are a few available projections. Suchmethods can be developed by exploit the prior knowl-edge that the image to be reconstructed can containonly a small number of different intensity values.

RECONSTRUCTION WITH GEOMETRI-CAL PRIORS

One way to reduce ambiguity and to avoid in-tractability is to suppose that one wants to reconstructa binary image (also called discrete set) that belongsto a certain class of images having some geometricalproperties (connectedness, convexity, etc.). The mainchallenge here is to find geometrical properties thatdrastically reduces the number of possible solutions ofthe same reconstruction problem but still keeps thereconstruction process tractable.

Although a former result shows that the recon-struction in the class of horizontally and verticallyconvex (shortly, hv-convex) discrete sets from two pro-jections is NP-hard we have shown that it is possibleto reconstruct all the solutions of the same reconstruc-tion task with a quite fast algorithm in polynomial-time if we have the additional information that the setto be reconstructed is also 8-connected and consists ofseveral components [5].

For so called Q-convex sets a fast operation is alsopresented that can speed up the reconstruction of suchkind of sets [6]. Moreover we also investigated how theknowledge that the Q-convex set is not 8-connectedcan facilitate the reconstruction.

23

Page 25: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

We also generalised a uniqueness result of di-rected horizontally or vertically convex polyominoesand showed that this result also holds if the polyominois diagonally convex. Additionally, a negative result isalso given showing that for any other direction of con-vexity there can be exponentially many line-convexpolyominoes with the same horizontal and verticalprojections [3].

The general task of reconstructing a discrete setfrom four projections is NP-hard, too. In [4] we in-troduced the class of decomposable discrete sets anddeveloped a polynomial-time reconstruction algorithmfor this class using four projections. We also anal-ysed the possibility to adapt the developed techniquefor the reconstruction problems in the classes of Q-convexes and hv-convexes.

EMISSION DISCRETE TOMOGRAPHY

Recently, a new field of DT called Emission Dis-crete Tomography (EDT) has been studied. In thismodel the function to be reconstructed represents anobject having some radiation surrounded by a homo-geneous material having certain absorption. Thus, theprojections are depending not only the emission butthe absorption, too. Uniqueness and non-uniquenesstheorems for EDT was proved in [10] and [14]. More-over, in [9] the surprising result was published that inthe EDT model the reconstruction of hv-convex dis-crete sets from two projection can be done in polyno-mial time, at least for a certain absorption coefficient.

RECONSTRUCTION WITH OPTIMIZATI-ON

The reconstruction process can also be formulatedas an optimization task where the aim is to find theglobal minimum of the objective functional

Φ(f) =P

ϑ ||[Rf ](ϑ) − Pϑ||2 + γ||f − f0||2

where Pϑ denotes the input projection of angle ϑ, fis the image function that approximates the solution,[Rf ](ϑ) denotes the projection of the image f takenat angle ϑ, ||.|| is the Euclidean norm, and γ ≥ 0is a regularizing parameter. f0 is a prototype func-tion that has the same domain and range as f , and issimilar to the expected reconstruction result. Such amodel has the advantage that due to the second termon the right hand side prior information of the imageto be reconstructed can be incorporated. Moreover,it also can handle incorrect measurements of projec-tions. The regularazing parameter γ stands for con-trolling whether prior information or the projectionsare more reliable in a certain reconstruction task.

Such kind of optimization problems can be solved,e.g., by a simulated annealing (SA) approach. A lotof work has been done at our department in this field,mostly concentrating on applications of neutron andX-ray tomography [1,2,8,12,13]. The same techniquewas applied to solve some reconstruction problems inthe case of so-called fan-beam projections [15,16].

However, SA is not the only method by whichthe above optimization problem can be solved. Veryrecently, SA was compared to a dc-programmingmethod from the viewpoint of reconstruction effi-ciency. It turned out that (for the images used in thatcomparison) there is no significant difference of accu-racy and running time between the two methods [18].

DIRECT FRAMEWORK

DIscrete REConstruction Techniques (DIRECT)is a toolkit for testing and comparing 2D/3D re-construction methods of discrete tomography. Thetoolkit involves generating projections of discrete ob-jects, running reconstruction methods, and visualiza-tion of result. Most of the reconstruction techniquesdeveloped at our department are built-in into thisframework which is updated from time to time. TheDIRECT toolkit can be reached at

http://www.inf.u-szeged.hu/~direct/

with a full access for registered users.

CONFERENCES ORGANIZED

The Workshop on Discrete Tomography and ItsApplications was held in June 2005 in New York Citywith the co-organization of Attila Kuba. This smallconference attracted more than 60 participants from10 countries including all the authors of the presentpaper. The conference proceedings was publishedelectronically [17] and includes 38 contributions fromwhich 9 were written by our collegues as a sole or coau-thor. Furthermore, based on some of the talks a bookwas edited entitled Advances in Discrete Tomographyand Its Applications that will be published in March2007 [7], in which 6 from the 15 chapters are writ-ten by the members of our group, solely or partially.Further informations on the conference are availableat

http://www.dig.cs.gc.cuny.edu/

The 13th Conference on Discrete Geometry forComputer Imagery was held in Szeged in October2006. As part of the conference program one sessionwas devoted to the topic of DT. Some of the authorsof this paper has also publications in the conferenceproceedings [11]. The homepage of the conference canbe found at

http://www.inf.u-szeged.hu/dgci

ACKNOWLEDGEMENTS

The mentioned research tasks were supportedby the following grants: NFS DMS0306215, OTKAT048476, FKFP 0908/1997, OTKA T032240, OTKAT032241.

REFERENCES

[1] M. Balasko, E. Svab, A. Kuba, Z. Kiss, L. Rodek,A. Nagy: Pipe corrosion and deposit study us-ing neutron- and gamma- radiation sources. 5thInternational Topical Meeting on Neutron Ra-diography Nuclear Instruments and Methods inPhysics (Research A) 542 (2005) 302–308.

[2] M. Balasko, A. Kuba, A. Nagy, Z. Kiss, L. Rodek,L. Rusko: Neutron-, gamma-, and X-ray three-dimensional computed tomography at the Bu-dapest research reactor site. 5th InternationalTopical Meeting on Neutron Radiography NuclearInstruments and Methods in Physics (ResearchA) 542 (2005) 22–27.

[3] P. Balazs: The number of line-convex directedpolyominoes having the same orthogonal projec-tions. In [11] 77–85.

24

Page 26: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[4] P. Balazs: A decomposition technique for recon-structing discrete sets from four projections. Im-age and Vision Computing, accpeted.

[5] P. Balazs, E. Balogh, A. Kuba: Reconstruction of8-connected but not 4-connected hv-convex dis-crete sets. Discrete Applied Mathematics 147(2-3) (2005) 149–168.

[6] S. Brunetti, A. Daurat, A. Kuba: Fast filling op-erations used in the reconstruction of convex lat-tice sets. In [11] 98–109.

[7] G.T. Herman, A. Kuba (Eds.): Advancesin Discrete Tomography and Its Applications,Birkhauser, Boston, to appear in March 2007.

[8] Z. Kiss, L. Rodek, A. Kuba: Image reconstruc-tion and correction methods in neutron and X-ray tomography. Acta Cybernetica 17 (2005) 557–587.

[9] A. Kuba, A. Nagy, E. Balogh: Reconstruc-tion of hv-convex binary matrices from their ab-sorbed projections. Discrete Applied Mathemat-ics 139(1-3) (2004) 137–148.

[10] A. Kuba, M. Nivat: A sufficient condition fornon-uniqueness in binary tomography with ab-sorption. Theor. Comput. Sci. 346(2-3) (2005)335–357.

[11] A. Kuba, L. G. Nyul, K. Palagyi: Discrete Ge-ometry for Computer Imagery, 13th InternationalConference, DGCI 2006, Szeged, Hungary, Octo-ber 25-27, 2006, Proceedings, Lect. Notes. Com-put. Sci. 4245 (2006)

[12] A. Kuba, L. Rodek, Z. Kiss, L. Rusko, A. Nagy,M. Balasko: Discrete Tomography in neutron ra-diography. 5th International Topical Meeting onNeutron Radiography Nuclear Instruments andMethods in Physics (Research A) 542 (2005)376–382.

[13] A. Kuba, L. Rusko, L. Rodek, Z. Kiss: Prelimi-nary studies of Discrete Tomography in NeutronImaging. IEEE Trans. on Nuclear Sciences 52(2005) 380–385.

[14] A. Kuba, G. J. Woeginger: Two remarks on re-constructing binary vectors from their absorbedprojections. Lect. Notes. Comput. Sci. 3429(2005) 148–152.

[15] A. Nagy, A. Kuba: Recontruction of binary ma-trices from fan-beam projections. Acta Cybernet-ica 17/2 (2006) 359–385.

[16] A. Nagy, A. Kuba: Parameter settings for re-constructing binary matrices from fan-beam pro-jections. Journal of Computing and InformationTechnology 14/2 (2006) 100–110.

[17] Proceedings of the Workshop on Discrete Tomog-raphy and its Applications, Elec. Notes Discr.Math. 20

[18] S. Weber, A. Nagy, T. Schule, Ch. Schnorr, A.Kuba: A benchmark evaluation of large-scaleoptimization approaches to binary tomography.In [11] 146–156.

VIII. HIGHER-ORDER ACTIVE CON-TOURS AND ITS APPLICATIONTO TREE CROWN DETECTION

OBJECTIVES, GOALS

The aim of our work is to introduce prior shapeknowledge into existing image segmentation models.To accomplish we extended the recently introducedhigher-order active contour framework for region andimage modeling by introducing a model for a ‘gas ofcircles’, the ensemble of regions in the image domainconsisting of an unknown number of circles, with ap-proximately fixed radius and short range of interac-tions. We applied the developed models of currentinterest in remote sensing image processing: the ex-traction of tree crowns. Forestry services are inter-ested in various quantities associated with forests andplantations, such as the density of trees, the meancrown area and diameter, etc.

To include more complex prior knowledge, longer-range interactions are needed. There is a large bodyof work that does this implicitly, via a template re-gion or regions to which the segmented region R iscompared. However, such energies effectively limitR to a bounded subset of region space close to thetemplate(s), which excludes, inter alia, cases like treecrown extraction in which R has an unknown numberof connected components. ‘Higher-order active con-tours’ (HOACs) provide a complementary approach.HOACs generalize classical active contours to includemultiple integrals over the contour. Thus HOAC ener-gies explicitly model long-range interactions betweenboundary points without using a template. This al-lows the inclusion of complex prior knowledge whilepermitting the region to have an arbitrary number ofconnected components, which furthermore may inter-act amongst themselves. The approach is very gen-eral: classical energies are linear functionals on thespace of regions; HOACs include all polynomial func-tionals.

In [2,3,6], a HOAC energy was used for tree crownextraction. In this ‘gas of circles’ model, collectionsof mutually repelling circles of given radius r0 are lo-cal minima of the geometric energy. The model hasmany potential applications in varied domains, but itsuffers from a drawback: such local minima can trapthe gradient descent algorithm used to minimize theenergy, thus producing phantom circles even with nosupporting data. The model as such is not at fault:an algorithm capable of finding the global minimumwould not produce phantom circles. This suggests twoapproaches to tackling the difficulty. One is to finda better algorithm. The other is to compromise withthe existing algorithm by changing the model to avoidthe creation of local minima, while keeping intact theprior knowledge contained in the model. We solvedthe problem of phantom circles in [2, 3, 6]’s model bycalculating, via a Taylor expansion of the energy, pa-rameter values that make the circles into inflectionpoints rather than minima. In addition, we find thatthis constraint halves the number of model parame-ters, and severely constrains one of the two that re-main, while improving the empirical success of themodel [4,5].

THE ‘GAS OF CIRCLES’ MODEL

HOAC energies generalize classical active contourenergies by including multiple integrals over the con-tour. The simplest such generalizations are quadratic

25

Page 27: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

energies, which contains double integrals. There areseveral forms that such multiple integrals can take,depending on whether or not they take into accountcontour direction at the interacting points. The Eu-clidean invariant version of one of these forms is

Eg(γ) = λL(γ) + αA(γ)

−β2

Z Zτ (p) · τ (p′)Ψ(|p, p′|)dpdp′,

where γ is the contour, parameterized by p; L isthe length of the contour; A is the area; |p, p′| =|γ(p) − γ(p′)|; τ = γ is the (unnormalized) tangentvector to the contour; and Ψ is an interaction functionthat determines the geometric content of the model.With an appropriate choice of interaction function Ψ,the quadratic term creates a repulsion between an-tiparallel tangent vectors. This has two effects. First,for particular ranges of α, β, and dmin (λ = 1 wlog),circular structures, with a radius r0 dependent on theparameter values, are stable to perturbations of theirboundary. Second, such circles repel one another ifthey approach closer than 2dmin. Regions consistingof collections of circles of radius r0 separated by dis-tances greater than 2dmin are thus local energy min-ima. We [2,3,6] called this the ‘gas of circles’ model.

Via a stability analysis, we [2,3,6] found the rangesof parameter values rendering circles of a given radiusstable as functions of the desired radius. Stability,however, created its own problems, as circles some-times formed in places where there was no supportivedata. To overcome this problem, in [4,5], the criterionthat circles of a given radius be local energy minimawas replaced by the criterion that they be points ofinflexion. As well as curing the problem of ‘phantom’circles, this revised criterion allowed the fixing of theparameters α, β, and dmin as functions of the desiredcircle radius, leaving only the overall strength of theprior term, λ, unknown. For energy-based models, pa-rameter adjustment is a problem, so this is a welcomeadvance.

To illustrate the behaviour of the prior model, fig-ure 7 shows the result of gradient descent starting fromthe region on the left. Note that there is no data term.The parameter values in these experiments render thecircles involved stable. With the parameter values cal-culated in [4,5], they would disappear.

Figure 8 illustrates results using the publishedmodels.

A MULTI-SPECTRAL DATA MODEL

In the above models we also described a likelihoodmodel. This described the behaviour of only one bandof the three available bands in the CIR images whichwe are using provided by the French Forest Inventory(IFN). The model was Gaussian, with the values atdifferent pixels independent, and with different meansand variances for tree crowns and the background.While successful, this model, even with the strong re-gion prior, was not capable of extracting accuratelythe borders of all trees. Some trees were simply toosimilar to the background. The purpose of [1], is to re-place the likelihood model in [2–6] by one that makesuse of all three bands in the CIR images. We studiedthe improvement or otherwise of the extraction resultsproduced by modelling the three bands as indepen-dent or as correlated. As we shown, even at the levelof maximum likelihood, the inclusion of ‘colour’ infor-mation, and in particular, interband correlations, can

greatly improve the results, and in conjunction withthe region prior, the full model is considerably betterthan that based on one band alone. The results canbe seen on figure 9.

COLLABORATION

This work is a joint research between ARIANAresearch group of INRIA Sophia Antipolis, France andInstitute of Informatics, University of Szeged; basedon a bidirectional Ph.D. work. The project started in2004.

ACKNOWLEDGEMENT

This work was sponsored by a Hungarian-FrenchBilateral Grant PAI Balaton (F-3/04), EU projectIMAVIS (FP5 IHP-MCHT99), EU project MUSCLE(FP6-507752), Hungarian Scientific Research Fund –OTKA T046805 and a Janos Bolyai Research Fellow-ship of the Hungarian Academy of Sciences. PeterHorvath was having his scholarship through the Doc-toral School of the University of Szeged, Hungary andthe Ministry of Foreign Affaires, France. The CIRimages were provided by the French Forest Inventory(IFN).

REFERENCES

[1] P. Horvath. A Multi-Spectral Data Model forHigher-Order Active Contours and its Applicationto Tree Crown Extraction. In Proceedings Scan-dinavian Conference on Image Analysis (SCIA),2007. Submitted.

[2] P. Horvath, I. H. Jermyn, Z. Kato, and J. Zerubia.A Higher-Order Active Contour Model for TreeDetection. In Proc. International Conference onPattern Recognition (ICPR), Hong Kong, China,August 2006.

[3] P. Horvath, I. H. Jermyn, Z. Kato, and J. Zeru-bia. A Higher-Order Active Contour Model of a‘Gas of Circles’ and its Application to Tree CrownExtraction. Pattern Recognition, November 2006.Submitted.

[4] P. Horvath, I. H. Jermyn, Z. Kato, and J. Zerubia.An improved ‘gas of circles’ higher-order activecontour model and its application to tree crownextraction. In Proc. Indian Conference on Vision,Graphics and Image Processing (ICVGIP), Madu-rai, India, December 2006.

[5] P. Horvath, I. H. Jermyn, Z. Kato, and J. Zerubia.Kor alaku objektumok szegmentalasa magasabbrendu aktıv kontur modellek segıtsegevel. In Proc.KEPAF, Debrecen, Hungary, January 2007.

[6] P. Horvath, I. H. Jermyn, J. Zerubia, and Z. Kato.Higher-Order Active Contour Model of a ‘Gas ofCircles’ and its Application to Tree Detection. Re-search Report 6026, INRIA, France, November2006.

IX. PARAMETRIC ESTIMATIONS OF 2DAFFINE TRANSFORMATIONS ONBINARY IMAGES

We consider the problem of planar object registrationon binary images. The purpose is to find an unknowntransformation between a given known object (tem-plate) and a distorted observation of the template.We only consider affine transformations (translation,scaling, rotation and shearing). The direct approach

26

Page 28: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Figure 7. Sequences of curve evolution using Eg itself, from left to right: from the initialization to stable state.

Figure 8. Results on real aerial images, first column: original, second: results with [2,3,6] model, last column:results using [4,5]. IFN c©

Figure 9. Results on real CIR aerial images, first column: original images, second: results using only the infraredchannel, last column: results using [1] model. IFN c©

27

Page 29: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

is to apply each of the allowed affine deformations tothe template and search for the one that matches theobservation. While the object is known, the tremen-dous number of possible transformations makes thisapproach unfeasible. Therefore classical registrationalgorithms reformulate the task as a non-linear opti-mization problem. Our approach adopts a novel ideawhere the exact transformation is obtained as a so-lution of a set of polynomial equations. These equa-tions are constructed in a simple way using some basicgeometric information of the binary image. Anotheradvantage of the proposed solution is that it is fast,unique and exact regardless of the magnitude of trans-formation.

INTRODUCTION

Image registration is a crucial step in almost allimage processing tasks [1,8] where images of differentviews or sensors of an object need to be compared orcombined. In a general setting, one is looking for atransformation which aligns two images such that oneimage (called the observation) becomes similar to thesecond one (called the template). Due to the largenumber of possible transformations, there is a hugevariability of the object signature. In fact, each ob-servation is an element of the orbit of the transfor-mations applied to the template. Hence the problemis inherently ill-defined unless this variability is takeninto account. Recently, a novel approach has been pro-posed by Hagege and Francos [4–6] which provides anaccurate and computationally simple solution to theproblem avoiding both the correspondence problem aswell as the need for optimization. The fundamentalnovelty is that it reformulates the original problem asan equivalent linear parameter estimation one havinga unique and exact solution.

ESTIMATION OF 2D AFFINE TRANSFOR-MATIONS

The parametric estimation of two-dimensionalaffine transformations between two gray-level imageshas been addressed by Hagege and Francos in [6]: Theobservation and template is regarded as two bounded,Lebesgue measurable two-dimensional functions g andh (both mapping R

2 → R) such that h(x) = g(Ax),where A is the unknown affine transformation thatwe want to recover. The proposed solution yields toa system of linear equations employing only zero andfirst order constraints while higher order moments areavoided. In this project, we have addressed an impor-tant special case: the registration of binary images.

Binary images do not contain radiometric informa-tion hence they can be represented by the characteris-tic function : R

2 → {0, 1}, where 0 and 1 correspondto the background and foreground respectively. Let usdenote the template by t and the observation by o.We will also use the following notations:

x = [x1, x2]T and y = [y1, y2]T , where x,y ∈ R2

A =

„a11 a12

a21 a22

«and A−1 =

„q11 q12q21 q22

«y = Ax, x = A−1y (1)

If A is the transformation which aligns the observationand template, then the following equality holds:

t(x) = o(Ax) (2)

Now we will construct a solution for A. Notethat it is also possible to solve for A−1 since A must

be invertible. The first step is to find the determi-nant of A, i.e. the measure of the transformation.A simple approach is to integrate t(x) by substitu-tion using Eq. (2). Note that we always use Lebesgueintegrals. The Jacobian |A| can then be evaluatedthrough the identity relationZ

R2t(x) =

ZR2

o(Ax) = |A−1|Z

R2o(y) (3)

|A| =R

R2 o(y)RR2 t(x)

(4)

The equality in Eq. (2) remains valid if we multiplyby the same non-zero constant or take the integral ofboth sides. Hence for k = 1, 2, we have

ZR2xk t(x) = |A−1|

2Xi=1

qki

ZR2yi o(y) (5)

Since the characteristic functions take only valuesfrom {0, 1}, we can further simplify the above inte-grals: Z

R2(x) =

ZF

1 (6)

where the domain F consists of the foreground re-gions: F = {x ∈ R

2| (x) = 1}. Therefore evaluatingthe integrals in Eq. (6) yields the area of the fore-ground regions. From this point of view, the measureof the transformation |A| corresponds to the ratio ofthe observation and template objects’ area. In the re-maining part of this paper, we will always integrateover the respective domain F unless otherwise noted.Therefore we obtain from Eq. (19) and Eq. (6)

qk1

Zy1 + qk2

Zy2 − |A|

Zxk = 0, k = 1, 2 (7)

Let us notice that these equations are based on thefirst order moments of the object on the observationand template. Similarly, we can obtain another twoequations by matching the second order moments ofthe object:

q2k1

Zy21 + 2qk1qk2

Zy1y2 + q2k2

Zy22 − |A|

Zx2

k = 0

(8)where k = 1, 2. The system (7),(8) provides 4 equa-tions which is enough to solve for the four unknowns.We may get up to two possible solutions for each un-known qki due to the quadratic polynomial equationsin Eq. (8). Out of these potential solutions, we have tochose the transformation whose elements are real andthe determinant equals the Jacobian |A−1| computedin Eq. (4). The sign ambiguity of the determinant canbe easily eliminated: A negative Jacobian would meanthat the transformation is not orientation-preserving(i.e. flipping of coordinates is allowed). In practice,however, physical constraints will usually prevent sucha transformation hence we can assume that |A| is al-ways positive. The uniqueness of the solution is thenguaranteed as long as the observation and template isnot affine symmetric (see [4] for the proof).

Let us now examine the existence of the solution.For that purpose, rewrite Eq. (7) and Eq. (8) for afixed k in the following simplified form, where weomit the k index and replace the coefficients of theunknowns by a, b, . . . , g:

aq1 + bq2 − c = 0

dq21 + eq1q2 + fq22 − g = 0 (9)

28

Page 30: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

We will show that an algebraic solution of the systemexists if the resultant [2] has a real solution: Assuminga = 0, let us rewrite the system Eq. (9) in terms of q1:

aq1 + (bq2 − c) = 0

dq21 + (eq2)q1 + (fq22 − g) = 0 (10)

Since d > 0, a sufficient condition for the existenceof common roots of the system Eq. (9) is that theresultant of the system must have real roots:

(a2f + b2d− abe)q22 + (ace− 2bcd)q2 + (c2d− a2g) = 0(11)

Obviously, the above quadratic polynomial has realroots if its discriminant D is non-negative:

D = (ace− 2bcd)2− 4(a2f + b2d− abe)(c2d− a2g) ≥ 0

Note that D can always be computed hence our algo-rithm can always tell whether a solution exists or not.

ESTIMATION IN THE PRESENCE OFTRANSLATION

In the following we extend the presented solu-tion and show how to obtain the parameters whenthe transformation also includes an unknown transla-tion [4]:

y = Ax + c, x = A−1y −A−1c, and

t(x) = o(Ax + c) (12)

where c is a two-dimensional real vector representingthe translation along the two axis. We can put allparameters in a single matrix by using homogeneouscoordinates. More specifically let −A−1c = [q10, q20]T

and y = [1, y1, y2]T . Eq. (12) becomes

x = T y with T =

„q10 q11 q12q20 q21 q22

«(13)

The first column of T contains the translational pa-rameters. The Jacobian of the transformation can becomputed by Eq. (4) since the translation has no ef-fect on the measure of the transformation. Further-more, o(y) ≡ o(y) by definition, hence Eq. (19) andEq. (7) can be rewritten as follows:Z

xk t(x) =

ZT ky o(Ax + c)

qk0

Z1 + qk1

Zy1 + qk2

Zy2 = |A|

Zxk, k = 1, 2

(14)The second order moment equations can be similarlyrewritten. In the translational case, however, we havetwo more variables, therefore we have to add two moreequations. This is achieved by matching the thirdorder moments.

Now the system of equations contains six polyno-mial equations up to order three. Therefore we mayget up to six possible values for each unknown qki.Out of these solutions, we can select the right one byfollowing the procedure described in the previous sec-tion (i.e. drop the complex roots and select the trans-formation whose determinant matches the Jacobiancomputed by Eq. (4)).

NUMERICAL IMPLEMENTATION

In the previous section, we have constructed a sys-tem of polynomial equations and shown how to obtain

an exact solution. These equations are defined in thecontinuum while in practice we are working on dig-ital (i.e. discrete) images. This means that an in-tegral over the domain F can only be approximatedby a discrete sum over the foreground pixels intro-ducing an inherent, although negligible error into ourcomputation. A more important issue is the numeri-cal error caused by unnormalized image coordinates.This can be especially severe in our case since we areworking with squares and third powers of the coordi-nates. A standard technique to minimize this error isto transform the whole image into [−1, 1]×[−1, 1] (seeFig. 10): Fist we apply H to the template image Tand G to the observed image O. Then the normalizedimages O′ and T ′ are registrated.

Figure 10. Normalization of the template T and ob-servation O. The origin is translated to the center ofthe image and then it is scaled into [−1, 1]× [−1, 1].

Of course, we have to take into account the effectof normalization in our calculations since it affects themeasures. Therefore the Jacobian of the transforma-tion is computed as

|A′| = |G|R

o(y)

|H |R

t(x)=|G||H | |A| (15)

where A′ is the transformation aligning the normal-ized images. Furthermore, the left and right handsides of equations has to be multiplied by |G| and|H | respectively. Finally, the transformation aligningthe original, unnormalized images is obtained as

A = G−1A′H (16)

EXPERIMENTS

The proposed algorithm has been tested on syn-thetic as well as on real images. In Fig. 11, we haveapplied a known affine transformation A to the tem-plate and measured the error of the estimated trans-

formation matrix bA as A−1 bA − I :

A =

„4 2 1001 3 50

«

bA =

„4.0007 1.9983 95.07850.9843 2.9997 50.9082

«

A−1 bA − I =

„0.0034 −0.0004 −1.6581−0.0063 0.0001 0.8554

«The small errors are mainly caused by the discretiza-tion and rounding when we applied A to the template.Due to these errors, there is no perfect mapping be-tween the template and observation. Nevertheless, thealignment of the images is almost perfect in spite ofthe relatively large size (≈ 2000×3000) and fine detailsof the foreground object (see Fig. 11). We had simi-lar findings on real images, where a printed templatehas been scanned and registrated. Registration error

29

Page 31: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

is typically below 5% independently of the strength ofthe transformation.

In Fig. 12, we can see a comparison between ourmethod and the one proposed by Thevenaz et al. [7].Our algorithm performs clearly better.

Finally we remark that the CPU time of our Mat-lab implementation has been around 1 sec. on imagesof size ≈ 3000 × 4000.

(a) (b) (c)

Figure 11. Synthetic example: (a) template (b) ob-servation (c) registrated image

(a) (b)

(c) (d)

(e) (f)

Figure 12. Result of registrations: (a) template(337×400) (b) difference image of our method, error= 1.69% (c) the result of our method (d) observa-tion (2248×1587) (e) difference image with [7], error= 29.52% (f) result of registration [7]

CONCLUSION

We have presented a novel approach for binaryimage registration. The fundamental difference com-pared to classical image registration algorithms is thatour model works without any landmark, feature de-tection or optimization. It uses all the informationavailable in the input images, but there is no need foran established correspondence between them.

COLLABORATION

This work is a joint research between the Depart-ment of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Israel and Instituteof Informatics, University of Szeged.

ACKNOWLEDGEMENT

Csaba Domokos was having his scholarshipthrough the Doctoral School of the University ofSzeged.

REFERENCES

[1] Brown, L. G. A survey of image registrationtechniques. ACM Computing Surveys 24 (1992),325–376.

[2] Cohen, H. A Course in Computational AlgebraicNumber Theory. Springer, 1993.

[3] Domokos, C., Kato, Z., and Francos, J. M.

Parametric estimation of two-dimensional affinetransformations of binary images. 6th Confer-ence of Hungarian Association for Image Process-ing and Pattern Recognition (2007), 257–265.

[4] Hagege, R., and Francos, J. M. Parametricestimation of multi-dimensional affine transforma-tions: Solving a group-theory as a linear problem.IEEE Trans. Signal Process..

[5] Hagege, R., and Francos, J. M. Parametricestimation of two dimensional affine transforma-tions. Acoustics, Speech, and Signal Processing,2004. Proceedings. (ICASSP 2004) 3 (2004), 305–308.

[6] Hagege, R., and Francos, J. M. Paramet-ric estimation of multi-dimensional affine trans-formations: An exact linear solution. Acoustics,Speech, and Signal Processing, 2005. Proceedings.(ICASSP ’05) 2 (2005), 861–864.

[7] Thevenaz, P., Ruttimann, U. E., and Unser,

M. A pyramid approach to subpixel registrationbased on intensity. IEEE Transactions on ImageProcessing 7 (January 1998), 27–43.

[8] Zitova, B., and Flusser, J. Image registrationmethods: A survey. Image and Vision Computing21 (2003), 977–1000.

MARKOV RANDOM FIELDS AND MCMCSAMPLING IN IMAGE SEGMENTATION

Markov Random Field (MRF) modeling and MarkovChain Monte Carlo (MCMC) sampling methods aresuccessfully used in different areas of image process-ing [20]. Herein, we will consider two topics: The firstone is dealing with automatic segmentation of colorimages in a probabilistic framework. In particular,we address the problem of automatic identification ofGaussian mixture components either with known [9]or unknown [6,7] number of components. The secondone deals with a multilayer MRF model applied to thesegmentation of color video objects [8,10].

SEGMENTETION OF COLOR IMAGES VIAREVERSIBLE JUMP MCMC SAMPLING

The simplest statistical model for an image con-sists of the probabilities of pixel classes. The knowl-edge of the dependencies between nearby pixels canbe modeled by a MRF. Such models are quite pow-erful even if it is not easy to determine the values of

30

Page 32: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

the parameters which specify a MRF. If each pixelclass is represented by a different model then the ob-served image may be viewed as a sample from a real-ization of an underlying label field. Unsupervised seg-mentation can therefore be treated as an incompletedata problem where the color values are observed, thelabel field is missing and the associated class modelparameters, including the number of classes, need tobe estimated. Such problems are often solved usingMCMC procedures. Although the general theory andmethodology of these algorithms are fairly standard,they have their limitations in case of problems withparameters of varying dimension. Recently, a novelmethod, called Reversible Jump MCMC (RJMCMC),has been proposed by Green [4]. This method makesit possible to construct reversible Markov chain sam-plers that jump between parameter subspaces of dif-ferent dimensionality.

Due to the difficulty of estimating the number ofpixel classes (or clusters), unsupervised algorithms of-ten assume that this parameter is known a priori [10].When the number of pixel classes is also being esti-mated, the unsupervised segmentation problem maybe treated as a model selection problem over a com-bined model space. Our approach [6, 7] consists ofbuilding a Bayesian color image model using a firstorder MRF. The observed image is represented by amixture of multivariate Gaussian distributions whileinter-pixel interaction favors similar labels at neigh-boring sites. In a Bayesian framework, we are inter-ested in the posterior distribution of the unknownsgiven the observed image. Herein, the unknowns com-prise the hidden label field configuration, the Gaus-sian mixture parameters, the MRF hyperparameter,and the number of mixture components (or classes).Then a RJMCMC algorithm is used to sample fromthe whole posterior distribution in order to obtain aMAP estimate via simulated annealing.

The novelty of our approach is two-fold: first,we extend the ideas in [1, 19] and propose a RJM-CMC method for identifying multi-variate Gaussianmixtures. Second, we apply it to unsupervised colorimage segmentation. RJMCMC allows us the directsampling of the whole posterior distribution definedover the combined model space thus reducing the op-timization process to a single simulated annealing run.Another advantage is that no coarse segmentation nei-ther exhaustive search over a parameter subspace isrequired.

The model assumes that the real world scene con-sists of a set of regions whose observed color changesslowly, but across the boundary between them, theychange abruptly. What we want to infer is a labelingω consisting of a simplified, abstract version of theinput image: regions has a constant value (called alabel in our context) and the discontinuities betweenthem form a curve - the contour. Such a labelingω specifies a segmentation. Taking the probabilisticapproach, one usually wants to come up with a prob-ability measure on the set Ω of all possible segmen-tations of the input image and then select the onewith the highest probability. Note that Ω is finite,although huge. A widely accepted standard, also mo-tivated by the human visual system [13,17], is to con-struct this probability measure in a Bayesian frame-work. First, we have to quantify how well any occur-rence of ω fits F . This is expressed by the probabil-ity distribution P (F|ω) - the imaging model. Second,we define a set of properties that any segmentation

ω must posses regardless the image data. These aredescribed by P (ω), the prior, which tells us how wellany occurrence ω satisfies these properties. For thatpurpose, ωs is modeled as a discrete random variabletaking values in the set of labels Λ = {1, 2, . . . , L}.The set of these labels ω = {ωs, s ∈ S} is a ran-dom field, called the label process. Furthermore, theobserved color features are supposed to be a realiza-tion F from another random field, which is a func-tion of the label process ω. Basically, the image pro-cess F represents the manifestation of the underly-ing label process. The multivariate Normal densityis typically an appropriate model for such classifica-tion problems where the feature vectors fs for a givenclass λ are mildly corrupted versions of a single meanvector μλ. Applying these ideas, the image processF can be formalized as follows: P (fs | ωs) followsa three-variate Gaussian distribution N(μ,Σ), eachpixel class λ ∈ Λ = {1, 2, . . . , L} is represented by itsmean vector μλ and covariance matrix Σλ. As for thelabel process ω, a MRF model is adopted [10,11] overa nearest neighborhood system. The prior P (ω) willrepresent the simple fact that segmentations shouldbe locally homogeneous. Factoring the above distri-butions and applying the Bayes theorem gives us theposterior distribution P (ω|F) ∝ P (F|ω)P (ω). Notethat the constant factor 1/P (F) has been dropped aswe are only interested in bω which maximizes the poste-rior, i.e. the Maximum A Posteriori (MAP) estimateof the hidden field ω:

bω = arg maxω∈Ω

P (F | ω)P (ω),

The models of the above distributions depend also oncertain parameters. Since neither these parametersnor ω is known, both has to be inferred from the onlyobservable entity F . This is known in statistics as theincomplete data problem and a fairly standard tool tosolve it is Expectation Maximization [10,11]. However,our problem becomes much harder when the numberof labels L is unknown. When this parameter is alsobeing estimated, the unsupervised segmentation prob-lem may be treated as a model selection problem overa combined model space. From this point of view,L becomes a model indicator and the observation Fis regarded as a three-variate Normal mixture with Lcomponents corresponding to clusters of pixels whichare homogeneous in color.

The goal of our analysis is inference about thenumber L of Gaussian mixture components (each onecorresponds to a label), the component parametersΘ = {Θλ = (μλ,Σλ) | λ ∈ Λ}, the componentweights pλ summing to 1, the inter-pixel interactionstrength β, and the segmentation ω. A broadly usedtool to sample from the posterior distribution is theMetropolis-Hastings method [5]. Classical methods,however, can not be used due to the changing dimen-sionality of the parameter space. To overcome thislimitation, a promising approach, called ReversibleJump MCMC (RJMCMC), has been proposed in [4].When we have multiple parameter subspaces of differ-ent dimensionality, it is necessary to devise differentmove types between the subspaces [4]. These will becombined in a so called hybrid sampler. For the colorimage segmentation model, the following move typesare needed:

1. sampling the labels ω (i.e. re-segment the im-age);

2. sampling Gaussian parameters Θ = {(μλ,Σλ)};

31

Page 33: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

3. sampling the mixture weights pλ(λ ∈ Λ);

4. sampling the MRF hyperparameter β;

5. sampling the number of classes L (splitting onemixture component into two, or combining twointo one).

The only randomness in scanning these move types isthe random choice between splitting and merging inmove (5). One iteration of the hybrid sampler, alsocalled a sweep, consists of a complete pass over thesemoves. The first four move types are conventional inthe sense that they do not alter the dimension of theparameter space. Hereafter, we will focus on move (5),which requires the use of the reversible jump mecha-nism. This move type involves changing L by 1 andmaking necessary corresponding changes to ω,Θ andp.

d+r dimensional subspace

u

X

X’

ψ

r dimensional random vector

d dimensional subspace

ψ

−1

Figure 13. ψ is a diffeomorphism which transformsback and forth between parameter subspaces of differ-ent dimensionality. Dimension matching can be im-plemented by generating a random vector u such thatthe dimensions of (X,u) and X ′ are equal.

The split proposal begins by randomly choosing aclass λ with a uniform probability P split

select(λ) = 1/L.Then L is increased by 1 and λ is split into λ1 andλ2. In doing so, a new set of parameters need to begenerated. Altering L changes the dimensionality ofthe variables Θ and p. Thus we shall define a deter-ministic function ψ as a function of these Gaussianmixture parameters:

(Θ+, p+) = ψ(Θ, p, u) (17)

where the superscript + denotes parameter vectors af-ter incrementing L. u is a set of random variables hav-ing as many elements as the degree of freedom of jointvariation of the current parameters (Θ, p) and the pro-posal (Θ+, p+). Note that this definition satisfies thedimension matching constraint [4] (see Fig. 13), whichguarantees that one can jump back and forth betweendifferent parameter sub-spaces. This is needed to en-sure the convergence of simulated annealing towardsa global optimum. The new parameters of λ1 and λ2

are assigned by matching the 0th, 1th, 2th moments ofthe component being split to those of a combinationof the two new components [6,7]:

pλ = p+λ1

+ p+λ2

(18)

pλμλ = p+λ1μ+

λ1+ p+

λ2μ+

λ2(19)

pλ(μλμTλ + Σλ) = p+

λ1(μ+

λ1μ+T

λ1+ Σ+

λ1)

+p+λ2

(μ+λ2μ+T

λ2+ Σ+

λ2) (20)

There are 10 degrees of freedom in splitting λ since co-variance matrices are symmetric. Therefore, we needto generate a random variable u1, a random vectoru2 and a symmetric random matrix u3. We can nowdefine the diffeomorphism ψ which transforms the oldparameters (Θ, p) to the new (Θ+, p+) using the above

moment equations and the random numbers u1, u2,and u3:

p+λ1

= pλu1 (21)

p+λ2

= pλ(1− u1) (22)

μ+λ1,i = μλ,i + u2 i

rΣλ,i,i

1− u1

u1(23)

μ+λ2,i = μλ,i − u2 i

rΣλ,i,i

u1

1− u1(24)

Σ+λ1,i,j =

8><>:

u3 i,i

`1− u2 i

Σλ,i,i1

u1if i = j

u3 i,jΣλ,i,j

p(1− u2 i

2)

×p

(1− u2 j2)u3 i,iu3 j,j if i = j

(25)

Σ+λ2,i,j =

8>>>>><>>>>>:

(1− u3 i,i)`1− u2 i

×Σλ,i,i1

u1if i = j

(1− u3 i,j) Σλ,i,j

×p

(1− u2 i2) (1− u2 j

2)

×p

(1− u3 i,i) (1− u3 j,j) if i = j

(26)

The random variables u are chosen from the inter-val (0, 1]. In order to favor splitting a class intoroughly equal portions, beta(1.1, 1.1) distributions areused. To guarantee numerical stability in invertingΣ+

λ1and Σ+

λ2, one can use some regularization like

in [2], or one can use the well-known Wishart dis-tribution [15]. However, we did not experience suchproblems, mainly because the obtained covariance ma-trices are also reestimated from the image data in sub-sequent move types. Therefore as long as our inputimage can be described by a mixture of Gaussians, wecan expect that the estimated covariance matrices arecorrect. The next step is the reallocation of those sitess ∈ Sλ where ωs = λ. This reallocation is based onthe new parameters and has to be completed in sucha way as to ensure the resulting labeling ω+ is drawnfrom the posterior distribution with Θ = Θ+, p = p+

and L = L+ 1.

Original image Segmentation (3 labels)

x3

250

200

150

100

50

0

x2

250

200

150

100

50

0

x1

250

200

150

100

50

0

x3

250

200

150

100

50

0

x2

250

200

150

100

50

0

x1

250

200

150

100

50

0

Initial Gaussians Final (3 classes)

Figure 14. Segmentation of image rose41.

Table 2. F-measure and CPU time comparisonMethod F-measure CPU time

Human segmentation 0.79 —RJMCMC 0.57 15 minJSEG 0.56 2 min

Merging of a pair (λ1, λ2) is basically the inverseof the split operation.

Finally, the split or merge proposal is acceptedwith a probability relative to the probability ratio of

32

Page 34: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

the current and the proposed states. The segmenta-tion and parameter estimation is then obtained as aMAP estimation implemented via simulated anneal-ing:

Algorithm 1 (RJMCMC Segmentation)

©1 Set k = 0. Initialize bβ0, bL0, bp0, bΘ0, and the initialtemperature T0.

©2 A sample (bωk, bLk, bpk, bβk, bΘk) is drawn from theposterior distribution using the hybrid sampleroutlined earlier. Each sub-chain is sampled via thecorresponding move-type while all the other param-eter values are set to their current estimate.

©3 Goto Step ©2 with k = k+1 and Tk+1 until k < K.

As usual, an exponential annealing schedule(Tk+1 = 0.98Tk, T0 = 6.0) was chosen so thatthe algorithm would converge after a reasonablenumber of iterations. In our experiments, the al-gorithm was stopped after 200 iterations (T200 ≈0.1).

0 0.25 0.5 0.75 10

0.25

0.5

0.75

1

Recall

Pre

cisi

on

F=0.57 RJMCMC with beta = 2.5F=0.56 JSEG

Figure 16. Precision-recall curve for JSEG and RJM-CMC.

EXPERIMENTAL RESULT

The proposed algorithm has been tested on a va-riety of real color images and results have also beencompared to those produced by JSEG [3], a recentunsupervised color image segmentation algorithm. InFig. 15, we show a couple of results obtained on theBerkeley Segmentation Dataset [16], and in Fig. 16, weplot the corresponding precision-recall curves. Notethat RJMCMC has a slightly higher F-measure (seeTable 2) which ranks it over JSEG. However, it is fairto say that both method perform equally well but be-have differently: while JSEG tends to smooth out finedetails (hence it has a higher precision but lower re-call value), RJMCMC prefers to keep fine details atthe price of producing more edges (i.e. its recall valuesare higher at a lower precision value).

MULTILAYER MRF MODELIZATION

The human visual system is not treating differ-ent features sequentially. Instead, as pointed out byKersten etal. [13], multiple cues are perceived simul-taneously and then they are integrated by our visualsystem in order to explain the observations. Therefore

different image features has to be handled in a parallelfashion. In this project, we attempt to develop such amodel in a Markovian framework based on our earlierwork on color-texture segmentation [12]. We proposea new MRF image segmentation model which aims atcombining color and motion features for video objectsegmentation. The model has a multi-layer structure:Each feature has its own layer, called feature layer,where an MRF model is defined using only the cor-responding feature. A special layer is assigned to thecombined MRF model. This layer interacts with eachfeature layer and provides the segmentation based onthe combination of different features. Unlike previousmethods, our approach doesn’t assume motion bound-aries being part of spatial ones. The uniqueness of theproposed method is the ability to detect boundariesthat are visible only in the motion feature as well asthose visible only in the color one.

We use perceptually uniform CIE-L∗u∗v∗ colorvalues; and optical flow data obtained via the algo-rithm proposed in [18]. We have chosen this methodbecause it provides smooth optic flow fields neces-sary for our MRF model. Our model consists of 3layers. At each layer, we use a first order neighbor-hood system and extra inter-layer cliques (Fig. 17).The image features are represented by multi-variateGaussian distributions. For example, on the colorlayer, the observed image Fc = {f c

s|s ∈ Sc} consistsof three spectral component values (L∗u∗v∗) at eachpixel s denoted by the vector fc

s. We assume thatP (fc

s | ωs) follows a Gaussian distribution, the classesλ ∈ Λc = {1, 2, . . . , Lc} are represented by the meanvectors μc

λ and the covariance matrices Σcλ. The

class label assigned to a site s on the color layer isdenoted by ψs. The energy function U(ψ,Fc) of theso defined MRF layer has the following form:Xs∈Sc

Gc(fcs, ψs) + β

X{s,r}∈C

δ(ψs, ψr) +Xs∈Sc

V c(ψs, ηcs)

where Gc(fcs, ψs) denotes the Gaussian energy term

while δ(ψs, ψr) = 1 if ψs and ψr are different and −1otherwise. β > 0 is a parameter controlling the homo-geneity of the regions. As β increases, the resultingregions become more homogeneous. The last term(V c(ψs, η

cs)) is the inter-layer clique potential. The

motion layer adopts a similar energy function withsome obvious substitutions.

The combined layer only uses the motion and colorfeatures indirectly, through inter-layer cliques. A labelconsists of a pair of color and motion labels such thatη = 〈ηc, ηm〉, where ηc ∈ Λc and ηm ∈ Λm. The set oflabels is denoted by Λx = Λc×Λm and the number ofclasses Lx = LcLm. Obviously, not all of these labelsare valid for a given image. Therefore the combinedlayer model also estimates the number of classes andchose those pairs of motion and color labels which areactually present in a given image. The energy functionU(η) is of the following form:X

s∈Sx

(Vs(ηs) + V c(ψs, ηcs) + Vm(φs, η

ms ))

+αX

{s,r}∈C

δ(ηs, ηr)

where Vs(ηs) denotes singleton energies, V c(ψs, ηcs)

(resp. V m(φs, ηms ) denotes inter-layer clique poten-

tials. The last term corresponds to second order intra-layer cliques which ensures homogeneity of the com-bined layer. α has the same role as β in the color layer

33

Page 35: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Original imageHuman

segmentation JSEG RJMCMC

Figure 15. Benchmark results on images from the Berkeley Segmentation Dataset

34

Page 36: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

model and δ(ηs, ηr) = −1 if ηs = ηr, 0 if ηs = ηr and1 if ηc

s = ηcr and ηm

s = ηmr or ηc

s = ηcr and ηm

s = ηmr .

The idea is that region boundaries present at bothcolor and motion layers are preferred over edges thatare found only at one of the feature layers. At anysite s, we have 5 inter-layer interactions between twolayers: Site s interacts with the corresponding site onthe other layer as well as with the 4 neighboring sitestwo steps away (see Fig. 17). This potential is basedon the difference of the first order potentials at thecorresponding feature layers. Clearly, the difference is0 if and only if both the feature layer and the com-bined layer has the same label. If the labels are dif-ferent then it is proportional to the energy differencebetween the two labels. Finally, the singleton energycontrols the number of classes at the combined layerby penalizing small classes.

EXPERIMENTS

The proposed algorithm has been tested on realvideo sequences. Herein we present two of these re-sults. The computing time was around 3 minutes on aPentium4 3GHz on 320×240 frames. We also comparethe results to motion only and color only segmenta-tion (basically a monogrid model similar to the onedefined for the feature layers but without inter-layercliques). The mean vectors and covariance matriceswere computed over representative regions selected bythe user. The number of motion and color classes isknown a priori but classes on the combined layer areestimated during the segmentation process. Fig. 18shows some segmentation results. Note that the headof the men on this image can only be separated fromthe background using motion features. Clearly, themulti-layer model provides significantly better resultscompared to color only and motion only segmenta-tions. See Fig. 19 to compare the performance of theproposed method with the one from [14] on the Motherand Daughter standard sequence. Clearly, some of thecontours are lost by [14] (the sofa, for example) whileour method successfully identifies region boundaries.In particular, our method is able to separate the handof the mother from the face of the daughter in spite oftheir similar color. This demonstrates again that theproposed method is quite powerful at combining mo-tion and color features in order to detect boundariesvisible only in one of the features.

Inter−layer Cliques

Intra−layer Cliques

Motion

Combined

Color

Figure 17. Multi-layer MRF model.

ACKNOWLEDGEMENTS

This research was partially supported by anERCIM postdoctoral fellowship during the author’sstay at CWI, Amsterdam; the Janos Bolyai research

Original frame Optic flow

Color only Motion only

Multilayer

Figure 18. Segmentation results.

fellowship of the Hungarian Academy of Sciences;and the Hungarian Scientific Research Fund – OTKAT046805.

REFERENCES

[1] Barker, S. A., and Rayner, P. J. W. Unsu-pervised image segmentation using Markov ran-dom field models. Pattern Recognition 33, 4 (Apr2000), 587–602.

[2] Cremers, D., Tischhauser, F., Weickert, J.,

and Schnorr, C. Diffusion snakes: Introducingstatistical shape knowledge into the Mumford-Shah functional. International Journal of Com-puter Vision 50, 3 (2002), 295–313.

[3] Deng, Y., , and Manjunath, B. S. Unsuper-vised segmentation of color-texture regions in im-ages and video. IEEE Transactions on PatternAnalysis and Machine Intelligence 23, 8 (Aug.2001), 800–810.

[4] Green, P. J. Reversible jump Markov chainMonte Carlo computation and Bayesian modeldetermination. Biometrika 82, 4 (1995), 711–731.

[5] Hastings, W. K. Monte Carlo sampling meth-ods using Markov chains and their application.Biometrika 57 (1970), 97–109.

[6] Kato, Z. Reversible jump Markov chain MonteCarlo for unsupervised MRF color image seg-mentation. In Proceedings of Brithish MachineVision Conference (Kingston, UK, Sept. 2004),A. Hoppe, S. Barman, and T. Ellis, Eds., vol. 1,BMVA, pp. 37–46.

35

Page 37: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Original frame Optic flow

Multilayer Khan & Shah [14]

Figure 19. Comparison of the segmentation resultsobtained by the proposed method and those producedby the algorithm of Khan & Shah [14].

[7] Kato, Z. Segmentation of color images via re-versible jump MCMC sampling. Image and Vi-sion Computing (2007). to appear.

[8] Kato, Z., and Pong, T. C. Video object seg-mentation using a multicue Markovian model. InJoint Hungarian-Austrian Conference on ImageProcessing and Pattern Recognition (Veszprem,Hungary, May 2005), D. Chetverikov, L. Czuni,and M. Vincze, Eds., KEPAF, OAGM/AAPR,Austrian Computer Society, pp. 111–118.

[9] Kato, Z., and Pong, T. C. A Markov ran-dom field image segmentation model for colortextured images. Image and Vision Computing24, 10 (Oct. 2006), 1103–1114.

[10] Kato, Z., and Pong, T. C. A multi-layer MRFmodel for video object segmentation. In Proceed-ings of Asian Conference on Computer Vision(Hyderabad, India, Jan. 2006), P. J. Narayanan,S. K. Nayar, and H.-Y. Shum, Eds., vol. 3852of Lecture Notes in Computer Science, Springer,pp. 953–962.

[11] Kato, Z., Pong, T. C., and Lee, J. C. M.

Color image segmentation and parameter estima-tion in a Markovian framework. Pattern Recog-nition Letters 22, 3-4 (Mar. 2001), 309–321.

[12] Kato, Z., Pong, T. C., and Song, G. Q. Un-supervised segmentation of color textured imagesusing a multi-layer MRF model. In Proceedingsof International Conference on Image Process-ing (Barcelona, Spain, Sept. 2003), vol. I, IEEE,pp. 961–964.

[13] Kersten, D., Mamassian, P., and Yuille, A.

Object perception as Bayesian inference. AnnualReview of Psychology 55 (2004), 271–304.

[14] Khan, S., and Shah, M. Object based segmen-tation of video using color, motion and spatialinformation. In Proceedings of International Con-ference on Computer Vision and Pattern Recog-nition (Kauai, Hawaii, Dec. 2001), vol. II, IEEE,pp. 746–751.

[15] Mardia, K. V., Kent, J. T., and Bibby, J. M.

Multivariate Analysis. Academic Press, Duluth,London, 1979.

[16] Martin, D., Fowlkes, C., Tal, D., and Ma-

lik, J. A database of human segmented natu-ral images and its application to evaluating seg-mentation algorithms and measuring ecologicalstatistics. In Proceedings of International Con-ference on Computer Vision (July 2001), vol. 2,IEEE, pp. 416–423.

[17] Mumford, D. Pattern theory: a unifying per-spective. In Perception as Bayesian Inference,D. Knill and W. Richards, Eds. Cambridge Uni-versity Press, 1996, pp. 25–62.

[18] Proesmans, M., Gool, L. V., Pauwels, E.,

and Oosterlinck, A. Determination of opticalflow and its discontinuities using non-linear diffu-sion. In Proceedings of Eurpoean Conference onComputer Vision (1994), vol. 2, pp. 295–304.

[19] Richardson, S., and Green, P. J. OnBayesian analysis of mixtures with an unknownnumber of components. Journal of the Royal Sta-tistical Society, series B 59, 4 (1997), 731–792.

[20] Zerubia, J., Jalobeanu, A., and Kato, Z.

Markov random fields in image processing, appli-cation to remote sensing and astrophysics. Jour-nal de Physique, EDP Sciences IV, 12 (2002),117–136.

X. COMPUTER ASSISTED SURGERYAND BIOMECHANICAL ANALYSIS

INTRODUCTION

The surgical repair of fractured bones is often adifficult task, and the fixation of these bones has to beplanned very carefully. This is why trauma surgeonsmay use a Computer Aided Surgery (CAS) system toimprove surgical accuracy.

Our goal here is to develop a suitable CAS pack-age that is also capable of performing biomechanicaltests. The program can simulate the biomechanicalbehavior of possible surgical solutions and calculateits deformations and material stresses. These calcu-lations are based on Finite Element Analysis (FEA).Using these results the surgeon is able to see the weekpoints of the fixation before the surgery. He can eventry several surgical plans to pick the most promisingone.

DESCRIPTION OF THE SYSTEM

The system gets its data from CT images. Thefirst step is the segmentation [1] where the differenti-ation is done between various bone fragments and thebackground. Next, the segmented surface is approx-imated [3, 4] the with a triangle mesh (see Fig. 20),followed by a surface simplification [2] which reducesthe number of triangles in the mesh.

This surface mesh contains all the geometrical in-formation needed by the surgical planning module. Inthis module the user can move and rotate the variousbone fragments with the mouse. The planning mod-ule is also the place where virtual implants (screw andfixation plate) are inserted.

To simulate the biomechanical behavior of the sur-gical plan the geometrical model has to be convertedinto a mechanical model. The FEA mesh is generatedfrom the triangle mesh used for rendering. The ad-dition of load and boundary conditions is handled bythe user interface of the planning module. On Fig. 21.arrows indicate the area and direction of the appliedload.

36

Page 38: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Figure 20. Combined 3D view of a CT slice and thetriangle mesh.

Figure 21. The surgical plan of a broken jaw. Thefracture is stabilized with two fixation plates and tenscrews. Arrows show the direction of the applied load.

The finite element analysis is performed by an ex-ternal software. The results of the analysis, namelythe deformation under the load and the material stressare presented in our system, see Fig. 22.

Figure 22. The result of the finite element analysis.Dark colors indicate high material stress.

CONCLUSION

A novel system was presented to help the surgeonin planning orthopedic operations. With this systema virtual biomechanical lab was created and variousFEA studies of jaw, pelvis, hip, knee, and wrist werecarried out. The tool can be used by the surgeon tocreate surgical plans for fractured bone fixation and topredict the biomechanical stability of the plan beforethe operation takes place.

REFERENCES

[1] Nyul LG, Falcao AX, Udupa JK. Fuzzy- Con-nected 3D Image Segmentation at InteractiveSpeeds. SPIE Medical Imaging 2000.

[2] Garland M, Heckbert PS. Surface simplificationusing quadric error metrics. ACM SIGGRAPH;1997

[3] Lorensen WE, Cline HE. Marching Cubes: AHigh Resolution 3D Surface Construction Algo-rithm. ACM SIGGRAPH; 1987

[4] Visualization Toolkit: www.vtk.org

XI. SKELETONIZATION BY THINNINGIN 3D

Skeleton is a region–based shape feature to representthe general form of an object. Skeletonization (i.e.,skeleton extraction from binary objects) in 3D hasbecome a very challenging task in various medicaland engineering applications. Thinning is a frequentlyused technique for producing a reasoable approxima-tion to the skeleton or extracting skeleton-like features(i.e., centerline or topological kernel).

SKELETON AS A SHAPE FEATURE

Shape is a fundamental concept in computer vi-sion. It can be regarded as the basis for high–levelimage processing stages concentrating on scene analy-sis and interpretation. There are basically two differ-ent approaches for describing the shape of an object:• using the boundary that surrounds it and• using the occupied region.

Boundary–based techniques are widely used butthere are some deficiencies which limit their useful-ness in practical applications especially in 3D. There-fore, the importance of the region–based shape fea-tures shows upward tendency. The local object sym-metries represented by the skeleton certainly cannotreplace boundary–based shape descriptors, but com-plement and support them.

The skeleton is a region–based shape feature thathas been proposed by Blum as the result of the MedialAxis Transform. A very illustrative definition of theskeleton is given using the prairie–fire analogy: the ob-ject boundary is set on fire and the skeleton is formedby the loci where the fire fronts meet and quench eachothers. The formal definition of the skeleton has beenstated by Calabi: the skeleton of an object is the lo-cus of the centers of all the maximal inscribed hyper-spheres. The continuous skeleton of a solid 3D box isillustrated in Fig. 23.

���������������������������������������������������������������������������������������������������

Figure 23. Example of 3D skeleton. The original ob-ject was a solid box. Note, a skeleton in 3D generallycontains surface pathes (i.e., branched 2D manifolds).

SKELETONIZATION TECHNIQUES INDISCRETE SPACES

During the last two decades skeletonization in thedigital image raster has been an important researchfield. There are two major requirements to be com-plied with. The first one is geometrical. It means thatthe “skeleton” must be in the “middle” of the object

37

Page 39: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

and invariant under geometrical transformations. Thesecond one is topological requiring that the “skeleton”must be topologically equivalent to the original object.

There are three major discrete skeletonizationmethods:• based on distance transformation,• thinning, and• based on Voronoi–diagram.

The first method is to find the maximal inscribedhyperspheres. It requires the following 3–step process:

1. The original binary picture is converted intoanother one consisting feature and nonfeatureelements. The feature elements belong to theboundary of the discrete object.

2. The distance map is generated where each ele-ment has a value that approximates the distanceto the nearest feature element.

3. The detection of ridges (local extremas) as thecenters of maximal inscribed hyperspheres.

Unfortunately, the result of the distance transfor-mation depends on the selected distance and the ridgeextraction is a rather difficult task. The distance mapbased method fulfils the geometrical requirement if agood approximation to the Euclidean distance is ap-plied, but the topological correctness is not guaran-teed.

The thinning process is to simulate the fire–frontpropagation: a layer by layer erosion is executed untilthe “skeleton” is left. The iterative process is shown inFig. 24. The topological aspect is taken care by thin-ning. On the other hand the geometrical requirementcorrectness (i.e., invariance under arbitrary rotations)is not guaranteed.

The Voronoi diagram of a discrete set of points(called generating points) is the partition of the givenspace into cells so that each cell contains exactly onegenerating point and the locus of all points which arenearer to this generating point than to other generat-ing points. It is shown that the skeleton of an objectwhich is described by a set of boundary points can beapproximated by a subgraph of the Voronoi diagramof that generating points.

Both requirements can be fulfilled by the skele-tonization based on Voronoi diagrams but it is re-garded as an expensive process, especially for largeand complex objects.

We prefer thinning, since it:• preserves topology,• makes easy implementation possible (as a se-

quence of local Boolean operations),• can produce different types of skeleton-like

shape features (see fig. 25),• takes the least computational costs, and• can be executed in parallel.

THINNING METHODOLOGIES

A 3D binary picture is a mapping that assignsvalue of 0 or 1 to each point with integer coordinatesin the 3D digital space denoted by ZZ3. Points hav-ing the value of 1 are called black points, while 0’sare called white ones. Black points form objects ofthe picture. White points form the background andthe cavities of the picture. Both the input and theoutput of a picture operation are pictures. An oper-ation is reduction if it can delete some black points(i.e., changes them to white) but white points remainthe same. There is a fairly general agreement that areduction operation is not topology preserving if anyobject in the input picture is split (into two or more

original object after 15 iterations

after 30 iterations after 45 iterations

after 60 iterations final “skeleton” superim-posed on the original ob-ject

Figure 24. Example of thinning in 2D. The size of thetest image is 430× 460

ones) or completely deleted, if any cavity in the in-put picture is merged with the background or anotherhole, or if a cavity is created where there was nonein the input picture. There is an additional conceptcalled hole in 3D pictures. A hole (that doughnutshave) is formed by 0’s, but it is not a cavity. Topol-ogy preservation implies that eliminating or creatingany hole is not allowed.

Thinning must be a topology–preserving reduc-tion. Existing 3D thinning algorithms can be clas-sified from several points of view. One of them isthe classification on the produced skeletons: surface-thinning algorithms result in medial surfaces, curve-thinning ones can produce medial lines, and shrinkingalgorihms extract topological kernels.

Since the fire front propagation is by nature paral-lel, most of the existing thinning algorithms are par-allel (i.e., all border points satisfying the deletion con-dition of the actual phase of the process are deletedsimultaneously) [1–9]. Despite of this fact, we haveproposed two sequential thinning algorithms [10,11].

APPLICATIONS

Thinning is a common preprocessing operation inraster–to–vector conversion or in pattern recognition.Its goal is to reduce the volume of elongated objects.

38

Page 40: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������� �����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

Figure 25. Different types of 3D “skeletons”. Theoriginal elongated object (upper left), its medial sur-face produced by a surface thinning algorithm (upperright), its medial line (bottom left) extracted by acurve thinning algorithm, and its topological kernel(i.e., a minimal structure being topologically equiva-lent to the original object) created by a shrinking al-gorithm(bottom right). (Each small cube representsan object voxel.)

Some important applications have been appeared inmedical image processing, too [1–7,19–22].

REFERENCES

[1] K. Palagyi, A. Kuba: A thinning algorithm toextract medial lines from 3D medical images, inProc. 15th Int. Conf. Information Processing inMedical Imaging, IPMI’97, Poultney, USA, Lec-ture Notes in Computer Science 1230, Springer,1997, 411-416.

[2] K. Palagyi, A. Kuba: A parallel 12-subiteration3D thinning algorithm to extract medial lines, inProc. 7th Int. Conf. Computer Analysis of Imagesand Patterns, CAIP’97, Kiel, Germany, LectureNotes in Computer Science 1296, Springer, 1997,400-407.

[3] K. Palagyi, A. Kuba: A 3D 6–subiteration thin-ning algorithm for extracting medial lines, Pat-tern Recognition Letters 19, 1998, 613-627.

[4] K. Palagyi, A. Kuba: A hybrid thinning algo-rithm for 3D medical images, J. Computing andInformation Technology 6, 1998, 149-164.

[5] K. Palagyi, A. Kuba: A parallel 8–subiteration3D thinning algorithm, in Proc. 8th Int. Conf.on Discrete Geometry for Computer Imagery,DGCI’99, Marne-la-Valle, France, Lecture Notesin Computer Science 1568, Springer, 1999, 325-336.

[6] K. Palagyi, A. Kuba: A parallel 3D 12-subiteration thinning algorithm, Graphical Mod-els and Image Processing 61, 1999, 199-221.

[7] K. Palagyi: A 3D parallel shrinking algorithm,Acta Cybernetica 15, 2001, 201-211.

[8] K. Palagyi: A 3-subiteration 3D thinning al-gorithm for extracting medial surfaces, PatternRecognition Letters 23, 2002, 663-675.

[9] K. Palagyi: A 2-Subfield 3D Thinning Algo-rithm for Extracting Medial Curves, in Proc.Joint Hungarian-Austrian Conference on ImageProcessing and Pattern Recognition HACIPPR2005, Austrian Computer Society, 2005, 135-142.

[10] K. Palagyi, E. Sorantin, E. Balogh, A. Kuba,Cs. Halmai, B. Erdohelyi, K. Hausegger: A se-quential 3D thinning algorithm and its medicalapplications, in Proc. 17th Int. Conf. Informa-tion Processing in Medical Imaging, IPMI 2001,Davis, USA, Lecture Notes in Computer Science2082, Springer, 2001, 409-415.

[11] K. Palagyi, J. Tschirren, E.A. Hoffman, M.Sonka: Quantitative analysis of pulmonary air-way tree structures, Computers in Biology andMedicine 36, 2006, 974-996.

[12] K. Palagyi, E. Sorantin, Cs. Halmai, A. Kuba:3D thinning and its applications to medical imageprocessing, TASK Quarterly 3, 1999, 397-408.

[13] E. Sorantin, E. Balogh, A. Vilanova i Bartrolı, K.Palagyi, L.G. Nyul, S. Loncaric, M. Subasic, D.Kovacevic: Virtual Dissection of the Colon, in D.Caramella, C. Bartolozzi (eds.) 3D Image Pro-cessing - Techniques and Clinical Applications,Springer, 2002, 197-209.

[14] J. Tschirren, K. Palagyi, J.M. Reinhardt, E.A.Hoffman, M. Sonka: Segmentation, skeletoniza-tion, and branchpoint matching - A fully au-tomated quantitative evaluation of human in-trathoratic airway trees, in Proc. 5th Int.Conf. Medical Image Computing and Computer-Assisted Intervention, MICCAI 2002, Part II,Tokyo, Japan, Lecture Notes in Computer Sci-ence 2489, Springer, 2002, 12-19.

[15] E. Sorantin, Cs. Halmai, B. Erdohelyi, K.Palagyi, L.G. Nyul, K. Olle, B. Geiger, F. Lind-bichler, G. Friedrich, K. Kiesler: Spiral-CT-based assessment of tracheal stenoses using 3-D-skeletonization, IEEE Transactions on MedicalImaging 21, 2002, 263-273.

[16] K. Palagyi, J. Tschirren, M. Sonka: Quantitativeanalysis of intrathoracic airway trees: methodsand validation, in Proc. 18th Int. Conf. Informa-tion Processing in Medical Imaging, IPMI 2003,Ambleside, UK, Lecture Notes in Computer Sci-ence 2732, Springer, 2003, 222-233.

[17] E.A. Hoffman, J.M. Reinhardt, M. Sonka, B.A.Simon, J. Guo, O. Saba, D. Chon, S. Samrah, H.Shikata, J. Tschirren, K. Palagyi, K.C. Beck, G.McLennan: Characterization of the InterstitialLung Diseases via Density-Based and Texture-Based Analysis of Computed Tomography Im-ages of Lung Structure and Function, AcademicRadiology 10, 2003, 1104-1118.

[18] K. Palagyi, J. Tschirren, M. Sonka: Quantitativeanalysis of three-dimensional tubular tree struc-tures, in Medical Imaging 2003: Image Process-ing, San Diego, USA, in Proceedings of SPIE Vol.5032, 2003, 277-287.

39

Page 41: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[19] K. Palagyi, J. Tschirren, E.A. Hoffman, M.Sonka: Assessment of Intrathoracic AirwayTrees: Methods and In Vivo Validation, in Proc.Computer Vision and Mathematical Methods inMedical and Biomedical Image Analysis: ECCV2004 Workshops CVAMIA and MMBIA, Prague,Czech Republic, Lecture Notes in Computer Sci-ence 3117, Springer, 2004, 341-352.

[20] R. Beichel, T. Pock, Ch. Janko, B. Zotter, B. Re-itinger, A. Bornik, H. Bischof, K. Palagyi, E. So-rantin, G. Werkgartner, M. Sonka: Liver segmentapproximation in CT data for surgical resectionplanning, in Medical Imaging 2004: Image Pro-cessing, San Diego, USA, in Proceedings of SPIEVol. 5370, 2005, 1435-1446.

[21] J. Tschirren, G. McLennan, K. Palagyi, E.A.Hoffman, M. Sonka: Matching and anatomical la-beling of human airway tree, IEEE Transactionson Medical Imaging 24, 2005, 1540-1547.

[22] E. Sorantin, D. Mohadjer, L.G. Nyul, K. Palagyi,F. Lindbichler, B. Geiger: New advances forimaging of laryngotracheal stenosis by post pro-cessing of spiral-CT data, in W. Hruby (ed.) Dig-ital (R)Evolution in Radiology - Bridging the Fu-ture of Health Care, Springer, 2006, pp. 297-308.

XII. QUANTITAVIVE ANALYSIS OFTUBULAR TREE STRUCTURES

The developed approach is specifically targeting skele-tonization of vascular and airway tree structuresin medical images but it is general and applicableto many other skeletonization tasks. It builds onthe following concepts and properties: fast curve-thinning algorithm to increase computational speed,endpoint re-checking to avoid generation of spuri-ous side branches, depth-and-length sensitive pruning,and exact tree-branch partitioning allowing branchvolume and surface measurements. The method wasvalidated in computer and physical phantoms and inin vivo CT scans of human lungs. The validation stud-ies demonstrated sub-voxel accuracy of branch pointpositioning, insensitivity to changes of object orienta-tion, high reproducibility of derived quantitative in-dices of the tubular structures.

INTRODUCTION

Tubular structures are frequently found in livingorganisms. The tubes – e.g., arteries or veins are orga-nized into more complex structures. Trees consistingof tubular segments form the arterial and venous sys-tems, intrathoracic airways form bronchial trees, andother examples can be found. Computed tomography(CT) or magnetic resonance (MR) imaging providesvolumetric image data allowing identification of suchtree structures. Frequently, the trees represented ascontiguous sets of voxels must be quantitatively an-alyzed. The analysis may be substantially simplifiedif the voxel-level tree is represented in a formal treestructure consisting of a set of nodes and connect-ing arcs. To build such formal trees, the voxel-leveltree object must be transformed into a set of inter-connected single-voxel centerlines representing indi-vidual tree branches. Therefore, the aim of our workwas to develop a robust method for identification ofcenterlines and bifurcation (trifurcation, etc.) pointsin segmented tubular tree structures acquired in vivofrom humans and animals using volumetric CT or MR

scanning, rotational angiography, or other volumetricimaging means.

There are many reasons why identifying treeskeletons is important. Skeletons can serve as one-dimensional structures allowing guidance for orderlyexploration of the entire tree, they can serve as view-point trajectory for navigation purposes in virtualbronchoscopy or angioscopy. To facilitate quantita-tive analysis of the vascular or bronchial tree, e.g.,luminal area or wall thickness, measurements must beobtained in cross-sections perpendicular to the longaxis of the tree segments. Clearly, planes normal tothe tree skeletons must be identified and skeleton cor-rectness is of paramount importance. As such, quan-titative assessment of asthma or cystic fibrosis frompulmonary CT images depends on the performanceof the tree skeletonization method. Similarly, accu-racy and reproducibility of arterial plaque thicknessmeasurements from coronary CT or intravascular ul-trasound depends on the ability to skeletonize tubularstructures.

METHOD

The input of the proposed method is a 3D binaryimage representing a segmented voxel-level tree ob-ject. All main components of our method were specif-ically developed to deal with imaging artifacts typi-cally present in volumetric medical image data. Assuch, the method consists of the following main steps:

1. correction of the segmented tree – hole and cav-ity filling,

2. extraction of the 3D centerline – skeletoniza-tion,

3. tree pruning,

4. generation of a formal tree structure (see Fig.26),

5. tree partitioning (see Fig. 27), and

6. quantitative analysis.

For each partition/branch of the tree, the follow-ing measures/indices are calculated: branch length(defined as a Euclidean distance between the parentand child branch-points), branch volume (defined as avolume of all voxels belonging to the branch), branchsurface area (defined as a surface area of all boundaryvoxels belonging to the branch), and branch radius(derived from the branch length and the branch vol-ume).

The automated method for skeletonization,branch-point identification and quantitative analysisof tubular tree structures is robust, efficient, andhighly reproducible. It facilitates calculation of anumber of morphologic indices described above [1–7].

REFERENCES

[1] J. Tschirren, K. Palagyi, J.M. Reinhardt, E.A.Hoffman, M. Sonka: Segmentation, skeletoniza-tion, and branchpoint matching - A fully au-tomated quantitative evaluation of human in-trathoratic airway trees, in Proc. 5th Int.Conf. Medical Image Computing and Computer-Assisted Intervention, MICCAI 2002, Part II,Tokyo, Japan, Lecture Notes in Computer Sci-ence 2489, Springer, 2002, 12-19.

[2] K. Palagyi, J. Tschirren, M. Sonka: Quantitativeanalysis of intrathoracic airway trees: methods

40

Page 42: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Figure 26. A human airway tree and its centerlines(up). The corresponding formal tree structure, inwhich a path between two branch-points is replacedby a single edge (down).

and validation, in Proc. 18th Int. Conf. Informa-tion Processing in Medical Imaging, IPMI 2003,Ambleside, UK, Lecture Notes in Computer Sci-ence 2732, Springer, 2003, 222-233.

[3] E.A. Hoffman, J.M. Reinhardt, M. Sonka, B.A.Simon, J. Guo, O. Saba, D. Chon, S. Samrah, H.Shikata, J. Tschirren, K. Palagyi, K.C. Beck, G.McLennan: Characterization of the InterstitialLung Diseases via Density-Based and Texture-Based Analysis of Computed Tomography Im-ages of Lung Structure and Function, AcademicRadiology 10, 2003, 1104-1118.

[4] K. Palagyi, J. Tschirren, M. Sonka: Quantitativeanalysis of three-dimensional tubular tree struc-tures, in Medical Imaging 2003: Image Process-ing, San Diego, USA, in Proceedings of SPIE Vol.5032, 2003, 277-287.

[5] K. Palagyi, J. Tschirren, E.A. Hoffman, M.Sonka: Assessment of Intrathoracic AirwayTrees: Methods and In Vivo Validation, in Proc.Computer Vision and Mathematical Methods inMedical and Biomedical Image Analysis: ECCV2004 Workshops CVAMIA and MMBIA, Prague,Czech Republic, Lecture Notes in Computer Sci-ence 3117, Springer, 2004, 341-352.

Figure 27. The aim of the partitioning procedureis to partition all voxels of the segmented tree intobranches – each voxel is assigned a branch-specific la-bel. The segmented volume and the partitioned skele-tal tree (up) and the partitioned volume after label-propagation (down). (Note, that we used only 9 colorsin displaying these trees, therefore, the same color wasassigned to multiple branches.)

[6] J. Tschirren, G. McLennan, K. Palagyi, E.A.Hoffman, M. Sonka: Matching and anatomical la-beling of human airway tree, IEEE Transactionson Medical Imaging 24, 2005, 1540-1547.

[7] K. Palagyi, J. Tschirren, E.A. Hoffman, M.Sonka: Quantitative analysis of pulmonary air-way tree structures, Computers in Biology andMedicine 36, 2006, 974-996.

41

Page 43: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Department of Software Engineering

I. AD-HOC MOBILE AND MULTIMEDIANETWORKS

WIRELESS MESH NETWORKS WITH MO-BILITY SUPPORT

For geographical and demographic reasons the In-ternet penetration in rural areas is far from that inlarger cities. It seems that current business modelsand technologies cannot achieve a breakthrough inthis area. So new business models which are closerto real life situations in rural areas and villages areneeded. For example, in a small community peopleknow each other and they try to solve any arisingproblems in much closer cooperation than in largertowns and cities. From the aspect of technology andbusiness models the Wireless Mesh Network (WMN)solution seems to fit the bill. Utilizing this solution acommunity can achieve wireless network coverage fora small town or village. The network infrastructure ismanaged by volunteer citizens. As the whole system isadaptive and self-tuning, the system can be expandedin a plug-and-play manner without any special knowl-edge being needed. The WMN can be used to extendthe range and the services of an already existing WiFibased ISP (W-ISP) or multiple WISP’s. In the caseof multiple WISPs the WMN can be used as a com-mon access network. With a adaptive and volunteerrun WMN the cost of the network maintenance willbe significantly cheaper. As the cost of the networkmaintenance can be as high as 80% of the total costusing the WMN as an access network could be signif-icantly cheaper compared to current solutions.The limitations and the capabilities of the WirelessMesh Network has been studied by numerous articles.Despite numerous WMN implementations and largeWMN projects we have not found a solution that ad-dresses the following issues:

• Efficient resource scheduling

• Network wide QoS guaranties

• Mobility support

As a participants in the C@R EU-Funded project, ourgoal is to design and develop a WiFi-based WMN so-lution for rural communities. One novelty of our solu-tion is the new metric for the link selection. With thismetric we will be able to minimalize the interferencein the network and hence we will be able to maxi-malize the global throughput. Another novelty of oursolution lies in the scheduling structure. The nodeswith uplinks are the clusterheads in our topology. Themember nodes in a cluster report the measured/testedlink properties to the clusterhead. Based on this datathis node will be able to optimize the frequency reuseinside and outside the cluster. As we have a strictscheduling, a fine grained QoS control will be possi-ble. As a unique feature our mobility handling is anintegrated part of our solution. For further details,read article [1].

MULTIMEDIA NETWORKS

There is an ongoing integration process in the fieldof communication and broadcasting. The so called

“Triple Play” services are the place where the tra-ditional telecommunication companies meet with ca-ble TV operators and with Internet Service providers.The IP layer will be the commons basis for these ser-vices. Real-time services demand new services andstrict quality features from the network layer. Themulticast data communication paradigm is not a newinnovation and is actually as old as the World WideWeb. Due to the technical challenges and the lackof a “killer” application, it is still not widely used.It seems that the IPTV will change this. The unicastdata communication paradigm is not suitable for serv-ing a huge number of online TV watchers. We havenot found a software solution for the testing and mon-itoring of a multicast network. Our network testingand monitoring software solution tries to fill this gap.In the Network Testing section we will describe thistool and our result in the field of network testing andmonitoring.The Video-On-Demand is another promising area.Here cheap and scalable data storage capable of serv-ing a high number of concurrent streams is the biggestissue that needs to be addressed. Our LanStore frame-work is unique among the distributed storage solutionsbecause it uses the unused storage capacity of desktopmachines. In the Distributed Storage section we willdescribe our results in the field of distributed consis-tency and storage.

NETWORK TESTING

Testing an already deployed network can providevaluable information about future situations and ser-vices. System administrators need a framework thatcan also supply them with traffic orchestration andmeasurement data. In the Campus6 EU and Hungar-ian state-funded research and development project,the NetSpotter framework is a general purpose net-work testing package that has been designed and de-veloped. With this framework the user has the free-dom to create arbitrary packets and arbitrary mes-sage sequences. The message sequences can definedby a user-friendly GUI or by an XML format of theofficial MSC representation. With our powerful tem-plate solution one can easily create complex test sce-narios. Current test scenarios (RFC 3918) define onlypoint to multipoint measurements. We think that tobe able to correctly measure a network, we need mul-tipoint to multipoint measurements. With this ap-proach we can probably model the real traffic prop-erties more precisely. Our framework provides thiscapability with the help of software agents. There is acentral server cluster and there can be arbitrary num-ber of agents. One can define the message sequencesamong the agents with the previously mentioned MSCengine.We measured the channel-handling capabilities of theMRD6 multicast routing daemon for Linux. In the lit-erature we have not seen results like that for MRD6 orIPv6 multicast routing solutions. In our experimentsit turned out that the multicast network can be aneasy target of a DoS attack. With a relatively smallpacket number a multicast network can be shut down.

42

Page 44: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

In a real world scenario some rate limiting solutionshould be used. Further details about the frameworkand the results can be found in articles [2–4].

DISTRIBUTED STORAGE

LanStore is a highly reliable, fully decentralizedstorage system which can be constructed from alreadyexisting desktop machines. Our software utilizes theotherwise wasted storage capacity of these machines.Reliability is achieved with the help of a traditionalerasure coding algorithm called the Reed-Solomon al-gorithm which generates n error correcting code itemsfor each m data item. The distributed behavior iscontrolled by a voting-based quorum algorithm. Thisalgorithm is an optimized version of the classic Paxosalgorithm. Further details about the algorithm canbe found in the article [5] and presentation [5]. Withthis solution we can tolerate up to n simultaneouslyfailing machines. As LanStore is intended to be usedin LAN environments, instead of employing an over-lay multicast solution we used an IP-level multicastservice. To use the bandwidth effectively, we designeda special UDP-based multicast flow control protocol.For the implementation platform we chose the Win-dows family and the .NET framework as they are themost popular platforms in offices and university de-partments. So far we have implemented a prototypeversion of this solution. We measured its performanceand the results indicate that this solution can pro-vide a throughput comparable to the currently usednetwork file systems, its performance depending onthe selected error correcting capability, the numberof failing machines and the performance of the clientmachine. In special cases like video-on-demand witha high client number our solution can outperform thetraditional single server solutions. Further details canbe found in article [6]

CONNECTIONS OF RESEARCH TO EDU-CATION

Students can take part in the R&D projects aspart time participants or they can do their graduatework on a selected part of an R&D project. E.g: TheLanStore software was developed by more than fifteengraduating students. As we are involved in the Ciscoacademy network, the students can use the latest net-work devices for their studies.

REFERENCES

[1] V. Bilicki, T. Kllai, M. Kasza: Wireless MeshNetwork For Rural Communities. IST-Africa2007 Conference & Exhibition (IST-Africa 2007)

[2] V. Bilicki, M. Bohus, M. Kasza: Netspotter: aframework for network testing. In 7th Interna-tional Conference on Applied Informatics (ICAI2007)

[3] V. Bilicki: Testing and Verifying an IPv6 BasedMulticast Network. In Proceedings of the In-ternational Conference on Wireless and MobileCommunications and the International Multi-Conference on Computing in the Global Infor-mation Technology (ICWMC/ICCGI 2006, Pub-lication Date: 01-03 Aug. 2006, On page(s): 3-3, ISBN: 0-7695-2629-2)

[4] V. Bilicki: Network topology discovery, In FifthConference of PhD Students in Computer Science(CSCS 2006)

[5] V. Bilicki, D. J. Dombi: Paxos with multipleleaders, In Fifth Conference of PhD Students inComputer Science (CSCS 2006)

[6] V. Bilicki, D. J. Dombi: Building a framework forthe consistency management of the distributedapplications. In Proceedings of the 4th Interna-tional Conference on .NET Technologies, Pilsen,Czech Republic, May-June 2006, ProceedingsISBN 80-86943-10-0, page(s): 55-63

[7] V. Bilicki: LanStore: a highly distributed reli-able file storage system. In Proceedings of the 3rdInternational Conference on .NET Technologies,Pilsen, Czech Republic, May-June 2005

II. OPEN SOURCE DEVELOPMENT FOREMBEDDED SYSTEMS

INTRODUCTION

Nowadays, and according to the trends, in thefuture embedded systems and devices get more andmore widespread - their market is about 100 timesthe size of the desktop market, and will also grow ex-ponentially in the next decade.

Embedded systems are omnipresent nowadays andmake possible the creation of systems with a function-ality that cannot be provided by human beings. Ex-ample application areas are consumer electronic prod-ucts (e.g. CD players, microwave ovens), telecommu-nication (e.g. mobile phones), medical systems (e.g.pacemakers), traffic control (e.g. intelligent trafficlights), driving and car control (e.g. ABS), airborneequipment (e.g. fly-by-wire), and plant control (e.g.packaging machines, wafer steppers).

Due to their importance, the researchers of thedepartment are working on several embedded system-related research areas. These research topics were sug-gested by industrial partners, and most of the resultsare immediately utilized in real products.

OPTIMIZING FOR ENERGY

One of the big design challenges for mobile devicesis the optimal usage of the typically very limited en-ergy resources. Within the framework of the BilateralGerman-Hungarian Collaboration Project on Ambi-ent Intelligence Systems (BelAmI), we have been con-ducting research on the possibilities of reducing theenergy consumption of software with the help of com-pilers since late 2005. The evaluation of software opti-misation techniques requires the ability to accuratelymeasure the power consumption of a system. Themost trivial solution is to perform measurements on areal hardware. However, in some scenarios, e.g., whereautomatic collection and evaluation of large amountof results is required, hardware measurements can beoverly expensive or impractical. In these situationsan accurate simulation tool can be used. Thus, wehave created a cycle-accurate energy simulator toolfor the ARM v5TE architecture-based XScale proces-sor cores. The power dissipation graphs showing theaccuracy of the created simulator compared to realmeasurement are shown in Figure 28.

Currently, the simulator is used to assess the effectof various optimisation methods on energy consump-tion. Our focus is on static and dynamic voltage andfrequency scaling techniques.

OPTIMIZING FOR SIZE

In the resource constrained domain of embeddedsystems the program size is an important aspect as

43

Page 45: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

0 10.0

0.2

0.4

0.6

hard

war

edi

ssip

atio

n (W

)

0 10.0

0.2

0.4

0.6

mea

sure

ddi

ssip

atio

n (W

)

Figure 28. Measured and simulated power dissipation.

well. However, since the majority of compiler develop-ers are interested in the performance of the generatedcode, this objective is often neglected. Several bench-marks exist that measure the performance of the gen-erated code on a daily basis, however benchmark forcode size have not existed previously. We have devel-oped a benchmark called CSiBE (Code Size Bench-mark) [1], which regularly measures the size of thecode generated by GCC. We continuously maintainthe benchmark and look for irregular changes in theresult and act if required. Thanks to the existenceof the benchmark, the compiler has been improvedseveral times to generate a smaller code. Now it isconsidered as the standard GCC benchmark for size,which is used on a daily basis by several developers.The website gets more than 100 hits daily on average,and the offline version was downloaded by more than500 times. We presented our work related to the mea-surement of the code size generated by GCC in twotalks at the GCC Developers Summit, which gatheredthe key participants of this open source project [4,5].

Besides the measuring, we worked on algorithmsfor code size reduction as well. We implemented codefactoring algorithms in GCC and developed an en-hanced procedural abstraction technique, which pro-vides superior results compared to the existing solu-tions [7].

FLASH FILE SYSTEM IMPROVEMENTS

Embedded systems mostly use flash memory asstorage device. The embedded systems which arecomplex enough to run a real operating system (inopen source environment it is Linux), need a specialflash file system to store their base (root) file system.Using an ordinary file system would wear out the flashprematurely.

The most effective and most popular open-sourceflash file system is JFFS2. To make it more power-ful we improved its compression performance [6], andspeed (speeded up its mount/boot time 5-10 times).Our improvements [2] were partially sponsored byNokia Finland, and the results were approved by theopen-source community. Now it is the official part of

Figure 29. Blackdog, a small Linux server utilizingJFFS2

Figure 30. The Nokia770-based mobile ECG applica-tion.

the JFFS2 filesystem and the Linux kernel, and part ofmany industrial products such as Nokia 770 and N800and small Linux server of Realm called Blackdog (seeFigure 29).

Unfortunately JFFS2 has reached its limit: it wasdesigned more then 5 years ago, and it cannot betuned for larger flash than 512M. The problems arein the design level of the filesystem, so the develop-ment of a new generation of this filesystem (JFFS3)was necessary. This development is partially spon-sored by Nokia, and is still in the designing phase.

ECG APPLICATION DEVELOPMENT

The above developments are close to the systemlevel. To validate their effectiveness, we started anapplication development project on Nokia 770 in 2006,which was based on open source techniques.

We cooperated with Meditech Ltd., an ECG man-ufacturer company, and improved the functionalityof their mobile ECG device (called CardioBlue) withsome useful features using a Nokia 770 device: it dis-plays ECG diagrams, extends the capacity of Car-dioBlue, configures CardioBlue, etc. The created ap-plication [3] is capable of transfering real-time ECGdata to a remote PC as well, thus it makes remotemedical consultation possible.

The application was introduced at the Medica in-ternational workshop in November, 2006. Figure 30shows an example setup of the application.

REFERENCES

[1] Homepage of CSiBE. http://www.csibe.org.

44

Page 46: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[2] Homepage of JFFS2/3 Improvements.http://www.inf.u-szeged.hu/jffs2.

[3] Homepage of SmartECG.http://www.sed.hu/smartecg.

[4] A. Beszedes, R. Ferenc, T. Gergely, T. Gyimothy,G. Loki, and L. Vidacs. CSiBE benchmark: Oneyear perspective and plans. In Proceedings of the2004 GCC Developers’ Summit, pages 7–15, June2004.

[5] A. Beszedes, T. Gergely, T. Gyimothy, G. Loki,and L. Vidacs. Optimizing for space : Mea-surements and possibilities for improvement. InProceedings of the 2003 GCC Developers’ Summit(GCC 2003), pages 7–20, Ottawa, Canada, May2003.

[6] T. Gergely, F. Havasi, and T. Gyimothy. Binarycode compression based on decision trees. Pro-ceedings of the Estonian Academy of Sciences –Engineering, 11(4):269–285, Dec. 2005.

[7] G. Loki, A. Kiss, J. Jasz, and A. Beszedes.Code factoring in GCC. In Proceedings of the2004 GCC & GNU Toolchain Developers’ Sum-mit (GCC 2004), pages 79–84, Ottawa, Canada,June 2–4, 2004.

III. STATIC AND DYNAMIC PROGRAMANALYSIS

INTRODUCTION

Program slicing is a powerful program analysistechnique. It can be used for debugging, maintenance,reverse engineering and testing of programs. A sliceconsists of all statements and predicates that mightaffect a set of variables at a certain program point.A slice may be an executable program or a subset ofthe program code. Static slicing methods computethose statements which influence the value of a vari-able occurrence for all possible program inputs, whiledynamic slicing methods take only one specific inputinto account.

The Department of Software Engineering of theInstitute of Informatics performs significant researchactivity in the field of program analysis and specifi-cally program slicing, both in theoretical and practicalaspects. In the period 2003–2006 the following resultshave been achieved.

SLICING BINARY PROGRAMS

The original slicing algorithms were developed forhigh-level structured programs and comparatively lit-tle attention has been paid to the slicing of binary ex-ecutable programs. However, the application domainfor slicing binaries is similar to that for slicing high-level languages. Furthermore, there are special appli-cations of the slicing of programs without source codelike assembly programs, legacy software, and viruses.E.g., the slicing of binary executables can be a usefulmethod for source code recovery or for helping extractsecurity critical code fragments.

To address the above needs we gave a methodfor the interprocedural static slicing of binary exe-cutables [7]. We presented a conservative dependencegraph based approach and also improvements. Weevaluated both approaches on programs compiled forARM architecture.

We also experimented with several methods onhow to reduce the size of static slices. In [6], we de-scribed how superfluous edges can be removed fromthe statically computed call graph with the help ofdynamically gathered information. The evaluation ofthis method demonstrated that the slice size could bedramatically reduced if the application being analysedmade extensive use of indirect function calls.

THEORY OF SLICING

Previously, a large number of different slicing tech-niques have been introduced. Each preserves some as-pect of a programs behaviour and simplifies the pro-gram to focus exclusively upon this behaviour. Theirdefinitions, when given, have been operational, andtheir descriptions have been algorithmic. However,in order to understand the similarities and differencesbetween slicing techniques, a formal mechanism is re-quired.

We used a projection theory of slicing to providea declarative formulation of the definition of the dif-ferent forms of slicing [5]. With the help of the theorywe uncovered the precise relationship between variousforms of dynamic slicing and static slicing and pro-duced formal and executable definitions of forwardslicing. Our analysis of dynamic slicing introducedby Korel and Laski revealed that the subsumes rela-tionship between static and dynamic slicing is moreintricate that previous authors have claimed.

In all applications of slicing, the size of slices is cru-cial: the smaller the better. Based on the projectiontheory we established a formal mechanism for com-paring sets of minimal slices, which form the ideal forany slicing algorithm, to reveal the ordering relation-ship between various static and dynamic slicing tech-niques [2]. This allows us to determine whether onedefinition of slicing leads to inherently smaller slicesthan another. This puts statements such as “dynamicslices are smaller than static slices” on a firm theoret-ical footing.

The extended versions of the theoretical resultshave been published in journals [3,4].

EFFICIENT DYNAMIC SLICING

Dynamic Dependence Graph-based methods fordynamic program slicing are well understood but in-appropriate for practical use due to their inefficiencyin terms of space requirements. Namely, many tradi-tional methods for computing dynamic program slicesare based on this graph representation, which cap-tures the dynamically occurring dependences amongprogram elements. The problem is that, being depen-dent on the size of the execution history, this approachproduces data structures of unbounded size.

We proposed a common framework and differentalgorithms within it, which compute dynamic slicesbased on the same dynamic dependences that theDDG is built on, but without requiring the DDG it-self to be used. Rather, specialized data structuresare applied depending on the slicing scenario. Al-though some researchers mention similar algorithms,we are not aware of any other such comprehensiveoverview of the basic dependence-based dynamic slic-ing algorithms. These algorithms have been presentedin a conference paper with the discussion about theircomplexities and application scenarios [1]. The sce-narios are categorized along three dimensions: for-ward/backward slicing, demand driven/global, and

45

Page 47: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

forward/backward trace processing. Of the eight pos-sibilities, two are unfeasible while the others vary intheir complexity.

This work has been selected for publication in aspecial issue of the Journal of Software Maintenanceand Evolution: Research and Practice published byJohn Wiley & Sons, Ltd. expectedly in 2008.

ONGOING RESEARCH

There are two topics in the field of program analy-sis in which we produced the first results only recently.

The concept of union slices – the union of dynamicslices corresponding to different executions – proved tobe useful as a replacement to static slices, which are inmany cases overly conservative and hence imprecise.We continued the verification of our previous results inthis field on Java programs, which was presented by a5th year student at the Student Research Competitionin 2006.

The second topic deals with approximate algo-rithms for program analysis. Although there are wellelaborated methods (to which we also contributedsignificantly) that compute program dependences atthe lowest instruction level, the computational costof these algorithms is inappropriate in many appli-cations. Therefore, more efficient though less precisemethods are welcome. An approximate method forthe computation of dynamic dependences among func-tions (without requiring instruction level analysis) hasbeen elaborated with applications to impact analysis,debugging and program testing. The first publicationof this algorithm was made by a 5th year student atthe Student Research Competition winning the firstprize in 2006.

Also, both of these results are accepted for presen-tation at the 2007 European Conference on SoftwareMaintenance and Reengineering.

CONFERENCE ORGANIZATION

The 21st event of the most significant softwaremaintenance conference, the International Conferenceon Software Maintenance (ICSM 2005) was organizedby the Department of Software Engineering in 2005.The local organization issues of the Fifth Workshop onSource Code Analysis and Manipulation (SCAM 2005)

held in Budapest were coordinated by Akos Kiss.

R&D PROJECTS

Static and dynamic program analysis techniquescan be utilized in many practical problems relatedto the maintenance of large software systems. Theapplication of different techniques, including programslicing, to industrial software systems was verified inthe scope of R&D projects partly financed by na-tional grants and performed with partners from in-dustry. The purpose of the JARTA (Java regressiontesting and analysis) project (duration: 2005–6, ourshare of the grant: 4 MFt) was to produce a pro-totype tool that integrates various program analysistechniques for program understanding and regressiontesting, most notably instruction level program slic-ing. Similarly, in the CREG++ (C++ regressiontesting and analysis) project (duration: 2005–6, ourshare of the grant: 31.5 MFt) efficient methods wereimplemented for the analysis of large C++ softwaresystems. In both projects, the role of the Instituteof Informatics was the development of the program

analysis front end, and the implementation of block-level program instrumentation method, which is usedby the regression testing method.

ACKNOWLEDGEMENTS

This work was supported, in part, by nationalgrants NKFP-2004 2/013/04 (CREG++), GVOP-3.1.1.-2004-05-0049/3.0 (JARTA) and grant no. RET-07/2005 of the Peter Pazmany Program of the Hun-garian National Office of Research and Technology.

REFERENCES

[1] A. Beszedes, T. Gergely, and T. Gyimothy. Graph-less dynamic dependence-based dynamic slicing al-gorithms. In Proceedings of the Sixth IEEE In-ternational Workshop on Source Code Analysisand Manipulation (SCAM’06), pages 21–30, Sept.2006.

[2] D. Binkley, S. Danicic, T. Gyimothy, M. Harman,

A. Kiss, and B. Korel. Minimal slicing and therelationships between forms of slicing. In Proceed-ings of the 5th IEEE International Workshop onSource Code Analysis and Manipulation (SCAM2005), pages 45–54, Budapest, Hungary, Sept. 30 –Oct. 1, 2005. IEEE Computer Society. Best paperaward.

[3] D. Binkley, S. Danicic, T. Gyimothy, M. Harman,

A. Kiss, and B. Korel. A formalisation of the rela-tionship between forms of program slicing. Scienceof Computer Programming, 62(3):228–252, Oct.2006.

[4] D. Binkley, S. Danicic, T. Gyimothy, M. Harman,

A. Kiss, and B. Korel. Theoretical foundations ofdynamic program slicing. Theoretical ComputerScience, 360(1–3):23–41, Aug. 2006.

[5] D. Binkley, S. Danicic, T. Gyimothy, M. Harman,

A. Kiss, and L. Ouarbya. Formalizing executabledynamic and forward slicing. In Proceedings of the4th IEEE International Workshop on Source CodeAnalysis and Manipulation (SCAM 2004), pages43–52, Chicago, Illinois, USA, Sept. 15–16, 2004.IEEE Computer Society.

[6] A. Kiss, J. Jasz, and T. Gyimothy. Using dynamicinformation in the interprocedural static slicingof binary executables. Software Quality Journal,13(3):227–245, Sept. 2005.

[7] A. Kiss, J. Jasz, G. Lehotai, and T. Gyimothy.Interprocedural static slicing of binary executa-bles. In Proceedings of the 3rd IEEE InternationalWorkshop on Source Code Analysis and Manipu-lation (SCAM 2003), pages 118–127, Amsterdam,The Netherlands, Sept. 26–27, 2003. IEEE Com-puter Society.

46

Page 48: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Research Group on Artificial Intelligence

I. MACHINE LEARNING ALGORITHMSIN NATURAL LANGUAGE PROCESS-ING

The application of ML (Machine Learning) to practi-cal problems is an emerging field of research and de-velopment. In many cases only machine learning canprovide feasible approaches to algorithms, testing, andvalidation. Researchers at the Institute of Informaticsare studying a number of areas related to NLP (Natu-ral Language Processing) and extensively use machinelearning algorithms for solving various problems [16].

THE NATURAL LANGUAGE PROCESS-ING

Investigating characteristic features of Hungarianlanguage by means of information technology is a tra-dition at the Institute of Informatics. The history ofit goes back to Laszlo Kalmar’s work in the seventies.The intensity of research into this area substantiallyincreased in 1998 when the institute, as a participantof the ESPRIT LTR20237 ”ILP2” project, began todeal with the application of machine learning algo-rithms to NLP (Natural Language Processing).

The Institute of Informatics initiated a Hungar-ian NLP consortium in 1999 consisting of ResearchInstitute for Linguistics at the Hungarian Academy ofSciences and MorphoLogic Ltd. Budapest, and theInstitute of Informatics at the University of Szeged.The institute is a founding member of the inter-national TEI (Text Encoding Initiative) Consortium(http://www.tei-c.org) as well.

The Hungarian NLP consortium successfully ap-plied for R&D grants from the Hungarian Ministryof Education and Ministry of Economy. These grantsprovided financial support which enabled them doingthe research described below.

THE SZEGED CORPUS AND ITS SUCCES-SOR – THE SZEGED TREEBANK

Development work of the manually annotatedHungarian corpus began in 2000. At that time therewas no sufficiently large morpho-syntactically anno-tated and disambiguated corpus for Hungarian. TheHungarian NLP consortium won the support of theMinistry of Education (grant OM IKTA 27/2000)with a project aiming the creation of a 1 million-words-long disambiguated corpus. The project endedin 2002.

Later, during the NKFP 2/017/2001 project 20%more text was added as well as every hierarchic NP(noun phrase) annotation. This database was a pre-liminary 1.0 version of the Szeged Treebank. Theword treebank means a syntactically analyzed and an-notated corpus. The recent, Szeged Treebank 2.0has been finalized by 2005 in the framework of theOM IKTA 37/2002 project when all ADVPs (adver-bial phrases), ADJPs (adjectival phrases), PPs (post-noun phrases), CLs (clausal phrases), and VPs (verbphrases) were annotated. Using this corpus as a train-ing and validation database the consortium are deve-

loping syntax rules and an effective syntacticparser for Hungarian [7], [8], [9], [5], [11].

The corpus is available in XML and was encodedusing the TEIXLITE3 P2 or the P4 DTD scheme.Texts were collected from six different areas of re-cent Hungarian written sources (fiction, newspapers,legal texts, computer-oriented texts, teenage composi-tions, short business news). The HLT group maintaina software environment that supports the annotationworks [4]. The different versions of the Szeged Cor-pus and the Treebank can be freely obtained for re-search and education purposes after registration [3],see http://www.inf.u-szeged.hu/hlt.

THE HUNGARIAN EUROWORNETDATABASE

Semantic analysis of natural language texts re-quires a comprehensive database containing possi-ble meanings of concepts, so-called senses. Suchdatabases have already been available for foreign lan-guages and they are called wordnets. The EuroWord-net 4 family of wordnets provides not only a mean toestablish interconnections between senses in differentEuropean languages (by making use of the ILI, theInternational Language Index) but also for represent-ing different kinds of feature hierarchies. In 2005 theHungarian NLP consortium began to build a Hungar-ian EuroWordnet database starting from the Englishwordnet by translating about 30 000 general termsand adding 10 000 new ones [1]. This project was fi-nanced by the Ministry of Economy in the frameworkof GVOP AKF 2004/0191 grant.

PROCESSING NATURAL LANGUAGETEXTS

Researchers at the institute are studying the ap-plication of formal techniques at different stages ofNLP. Besides the preprocessing of texts, three partic-ular tasks are mentioned below where the applicationof formal approaches seems to be promising, as re-ported in the publications.

PART-OF-SPEECH TAGGING

The task of a POS tagger is, for a given text,to provide for each text word its contextually dis-ambiguated part-of-speech tag. In the first experi-ments in 1999, the annotated Hungarian TELRI cor-pus from the MULTEXT-East5 project was used. In[2], authors presented a preliminary study designedto illustrate the capabilities and limitations of cur-rent ILP and non-ILP algorithms on the HungarianPOS-tagging task. The popular C4.5 and Progol sys-tems as propositional and ILP representatives were se-lected, adding experiments with methods AGLEARN,a C4.5 preprocessor based on attribute grammars, andtwo ILP approaches PHM and RIBL. Each algorithmproduced disambiguation rules and, by applying theserules in a working tagger, a 96-97% per-word accuracy

3http://www.tei-c.org4http://www.illc.uva.nl/EuroWordNet/5http://nl.ijs.si/ME/

47

Page 49: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

could be attained. The work was done in coopera-tion with researchers from the Fraunhofer Institute inBonn.

When the Szeged Corpus was ready for use re-searchers studied several different learning algorithmsfor making a real-world POS-tagger program forHungarian. After several attempts at using first-order (ILP) learning methods, a cascade of a TnT(http://www.coli.uni-sb.de/ thorsten/tnt) and aBrill tagger (http://www.cs.jhu.edu/ brill) cur-rently gives the best results trained on a larger partof the 1.2 million-word corpus [18], [19].

LEARNING SYNTAX RULES FOR HUN-GARIAN

Similar to many other languages, Hungarian alsorelies heavily on the use and interrelation of ele-mentary word structures (syntagmas). NPs (NounPhrases) are the most distinctive units of Hungariansentences, hence shallow parsing primarily focuses onNP recognition.

Named entities, like person names, geographicnames, organizations’ names etc. play special roleamong noun phrases. Correct recognition of them,especially of those that have multiple words beforesyntactic parsing may have strong influence on theaccuracy of further parsing. Researchers developed amethod for Hungarian that made use of only lexicalfeatures of text words [12]. Later it has been success-fully applied in an international environment [22].

Sometimes, there are cases when the task is not tocollect the recognized named entities, but to removethem from the text. In some medical research elec-tronic health records are processed by computers butbefore that the texts have to be anonymized in orderto protect privacy of the patients. In the named entityremoval task the above mentioned method attained anexceptionally good result for English [21].

For producing a recognizer for general NP struc-tures researchers used parse trees collected from theSzeged Treebank as input. They produced NP syntaxrule sets from frequent tree patterns occurred. Sincethe number of such tree patterns were high, they madeexperiments on generalization of rules and in such away unite the similar ones [15].

When in 2005 the complete syntax annotation forthe Szeged Treebank was ready, they applied the pre-viously developed methods to produce rules for the fullsyntax [13]. Later, attempts were made to investigateon how to compress the initially large rule sets, andon how this compression can be aided by statistical ormachine learning algorithms [5], [14].

INFORMATION EXTRACTION

The aim of the IE (Information Extraction) is toprovide a structured, queriable dataset from the con-tent of natural language texts. This does not require aprogram to fully understand the text. The approachto IE investigated at the institute is to set up tem-plates (frames) with slots to be filled with information– so-called semantic frames –, then try to match sen-tences to these templates. This approach is similar tothe one that has been introduced by C. J. Fillmore inthe FrameNet project 6.

Machine learning algorithms have been success-fully used in learning semantic frames from trainingdata. Researchers at the institute created a learning

6http://framenet.icsi.berkeley.edu/

dataset with 2000 short business news items as a basisfor further investigation. Studying the applicability ofML in learning semantic frames is investigated in [16].

In the framework of the GVOP AKF 2004/0119grant of the Ministry of Economy the consortium part-ners developed a prototype of an IE system, that pro-cesses abstracts of biomedical publications can be re-trieved from the PubMed7 database. It collects infor-mation on gene interactions from the sentences, i.e.after reading an abstract it predicts whether the re-ferred publication deals with interactions of two ormore genes, it tries to determine the type of the inter-actions between the genes as well [6]. An experimentwith different realizations of an IE system for En-glish language medical discharge records can be foundin [20].

The Institute of Informatics together with its con-sortium partners is developing a tool-chain of NLPmodules necessary for building experimental IE sys-tems. An example prototype system is able to extractinformation from short business news related to cer-tain types of events in business life, such as acquisi-tions, balance reports, mid-term reports, contracts, orfusion.

Formal specification of semantic-frames can be for-mulated at a higher level of abstraction after the Hun-garian EuroWordnet database will be finished in 2007.Semantic frame definitions then can refer not only tolexical words, but to concepts with synonyms, andrestrictions on senses can also be applied. The de-velopment works are supported by the grant GVOPAKF 2004/0191.

OTHER APPLICATIONS OF LANGUAGETECHNOLOGY

The researchers at the institute began to assem-ble a Hungarian named entity corpus. Its name isNER (Named Entity Recognition) corpus and con-tains named entities collected by members of theNLP consortium and other stakeholders during thepast years. A smaller sense annotated corpus is cur-rently being built in connection with the EuroWordnetproject, the so-called wsd corpus. This can later beused as a test database for word sense disambiguationalgorithms.

RESEARCH CONNECTIONS IN EDUCA-TION

This research activities relate to the followingfields in Computer Science: Artificial Intelligence,Machine Learning, Knowledge Discovery, Computa-tional Linguistics, Information Extraction, FormalLanguages, Theory of Compiling and Parsing.

Unsolved problems are being studied by severalPhD students and investigated in students’ scien-tific projects, in masters and bachelor theses. Thehomepage of Human Language Technology groupis: http://www.inf.u-szeged.hu/hlt. The website contains up-to-date information about R & Dprojects, consortium partners, researchers, publica-tions, and downloadables provided by the group.

THE MSZNY CONFERENCE SERIES

In 2003 the Institute of Informatics organized theFirst Hungarian Conference on Computational Lin-guistics, MSZNY 2003 in Szeged. About hundred par-ticipants from all over Hungary came and presented

7http://www.pubmed.gov

48

Page 50: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

an overview of their work. A special issue of the inter-national journal Acta Cybernetica has been publishedin 2004 containing the best papers of the conference.

Since then this tradition was going on and in eachyear from 2003 the Institute of Informatics organizedthe MSZNY 2004, MSZNY 2005 and MSZNY 2006conferences. An issue of Acta Cybernetica containingthe best papers of MSZNY 2004 has been publishedin the Spring of 2006. See the conference homepageat the http://www.inf.u-szeged.hu/mszny2006.

ACKNOWLEDGEMENTS

The above-mentioned research were partially sup-ported by the following grants: OM IKTA 27/2000,NKFP 2/017/2001, OM IKTA 37/2002, NKFP2/008/2004, NKFP 2/042/2004, GVOP-3.1.1-2004-05-119/3.0 AKF, GVOP-3.1.1-2004-05-191/3.0 AKF,and NKFP 6/074/2005.

REFERENCES

[1] Alexin, Z., Csirik, J., Kocsor, A., Mihaltz, M.,Szarvas, Gy.: Construction of the Hungarian Eu-roWordNet Ontology and its Application to In-formation Extraction, Project Report, in Proc. ofthe Third International Global WordNet Confer-ence (GWC-06), Jeju Island, Korea, 22–26 Jan-uary, pp. 291–292 (2006)

[2] Alexin Z., Csirik J., Gyimothy T.: Pro-gramcsomag informaciokinyeresi kutatasoktamogatasara, II. Magyar SzamıtogepesNyelveszeti Konferencia (MSZNY 2004) ki-advanya, Szeged, december 9–10., pp. 41–49(2004)

[3] Alexin, Z., Csirik, J., Gyimothy, T., Bibok K.,Hatvani, Cs., Proszeky, G., Tihanyi, L.: Man-ually Annotated Hungarian Corpus in Proceed-ings of the Research Note Sessions of the 10thConference of the European Chapter of the Asso-ciation for Computational Linguistics EACL’03,Budapest, Hungary 15-17 April, pp. 53–56 (2003)

[4] Alexin, Z., Leipold, P., Csirik, J., Bibok, K.,Gyimothy, T.: A rule-based tagger develop-ment framework in Proc. of the Third Workshopon Learning Language in Logic LLL’2001 Eds:Lubos Popelısky, Strasbourg, France, pp. 1–10,(2001)

[5] Barta, Cs., Csendes, D., Csirik, J., Hocza, A.,Kocsor, A., Kovacs, K.: Learning Syntactic TreePatterns from a Balanced Hungarian NaturalLanguage Database, The Szeged Treebank, inProc. of IEEE International Conference on Nat-ural Language Processing and Knowledge Engi-neering (IEEE NLP-KE 2005), Wuhan, China 30October – 1 November, pp. 225–231 (2005)

[6] Csendes, D., Alexin, Z., Busa-Fekete, R., Kovacs,K.: New, Linguistics-based, Ontology-enabledApproaches in Biological Information Manage-ment, in the Proceedings of the e-Challenges2006 Conference, October 25–27, pp. 1352–1359,Barcelona, Spain (2006).

[7] Csendes D., Alexin Z., Csirik J., Kocsor A.: A

Szeged Korpusz s Treebank verzioinak t’ortenete,III. Magyar Szamıtogepes Nyelveszeti Konferen-cia (MSZNY 2005) kiadvanya, Szeged, december8–9., pp. 409–412 (2005)

[8] Csendes, D., Csirik, J., Gyimothy, T.: TheSzeged Corpus, in Proc. of the 5th InternationalWorkshop on Linguistically Interpreted Corpora(LINC 2004) at The 20th International Con-ference on Computational Linguistics (COLING2004), Geneva, Switzerland 23–29 August, pp.19–23 (2004)

[9] Csendes, D., Csirik, J., Gyimothy, T.: TheSzeged Corpus: A POS Tagged and SyntacticallyAnnotated Hungarian Natural Language Corpus,in Proc. of the Seventh International Confer-ence on Text, Speech and Dialogue (TSD 2004),Brno, Czech Republic 8–11 September, pp. 41–49(2004)

[10] Csendes, D., Csirik, J., Kocsor, A.: The SzegedTreebank Project, in Proc. of the Corpus Lin-guistics Conference, Birmingham, UK 14-17July, Conference series Vol. 1, No. 1, e-journal:www.corpus.bham.ac.uk/PCLC, ISSN 1747-9398

[11] Csendes D., Csirik J., Gyimothy T., Kocsor A.:The Szeged Treebank, in Proc. of the Eighth In-ternational Conference on Text, Speech and Dia-logue (TSD 2005), Karlovy Vary, Czech Republic12–16 September, and LNAI series Vol. 3658, pp.123–131 (2005)

[12] Farkas, R., Szarvas, Gy., Kocsor, A.: NamedEntity Recognition for Hungarian Using VariousMachine Learning Algorithms, Acta Cybernet-ica, Vol. 17, No. 3, pp. 633–646, Szeged, Hungary(2006)

[13] Hocza, A.: Learning Tree Patterns for SyntacticParsing Acta Cybernetica, Vol. 17, No. 3, pp.616–622, Szeged, Hungary (2006)

[14] Hocza A., Felfoldi L., Kocsor A.: Learning Syn-tactic Patterns Using Boosting and Other Classi-fier Combination Schemas, in Proc. of the EighthInternational Conference on Text, Speech and Di-alogue (TSD 2005), Karlovy Vary, Czech Repub-lic 12–16 September, and LNAI series Vol. 3658,pp. 69–76 (2005)

[15] Hocza, A.: Noun Phrase Recognition with TreePatterns, Acta Cybernetica, Vol. 16, No. 3, pp.611–623, Szeged, Hungary (2004)

[16] Hocza, A., Alexin, Z., Csendes, D., Csirik, J.,Gyimothy, T.: Application of ILP methods indifferent natural language processing phases forinformation extraction from Hungarian texts, inProceedings of the Kalmar Workshop on Logicand Computer Science, Szeged, Hungary, 1–2 Oc-tober, pp. 107–116, (2003)

[17] Horvath, T., Alexin, Z., and Gyimothy, T, Wro-bel, S.: Application of Different Learning Meth-ods to Hungarian Part-of-Speech Tagging, inProc. of the 9th International Workshop on In-ductive Logic Programming, Eds: Saso Dzeroskiand Peter Flach, LNAI, 1634, pp. 128–139,Springer Verlag, ISBN: 3-540-66109-3, (1999)

[18] Kuba, A., Bakota, T., Hocza, A., Oravecz, Cs.:Comparing different POS-tagging techniques forHungarian, in Proceedings of the MSZNY 2003(Hungarian Computational Linguistics) Confer-ence, Szeged, Hungary, 10–11 December, pp. 16–24, (2003)

[19] Kuba, A., Hocza, A., Csirik, J.: POS Tagging ofHungarian with Combined Statistical and Rule-based Methods in Proc. of the Seventh Interna-tional Conference on Text, Speech and Dialogue

49

Page 51: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

(TSD 2004), Brno, Czech Republic 8–11 Septem-ber, pp. 113–121 (2004)

[20] Gyorgy Szarvas, Szilard Ivan, Andras Banhalmi,Janos Csirik: Automatic Extraction of Seman-tic Content from Medical Discharge Records, 5thInternational Conference on System Science andSimulation in Engineering, WSEAS Transactionson Systems and Control, Issue 2, Vol 1, Decem-ber 2006, ISSN: 1991-8763 pp. 312–317, (2006)

[21] Gyorgy Szarvas, Richard Farkas, Szilard Ivan,Andras Kocsor, and Robert Busa-Fekete: An it-erative method for the de-identification of struc-tured medical text Workshop on Challenges inNatural Language Processing for Clinical Data(2006)

[22] Gyorgy Szarvas, Richard Farkas, Andras Koc-sor: A Multilingual Named Entity RecognitionSystem Using Boosting and C4.5 Decision TreeLearning Algorithms, in Proceedings of the NinthInternational Conference on Discovery Science,LNAI 4265, pp. 267–278, (2006)

II. PEER-TO-PEER ALGORITHMS ANDSYSTEMS

INTRODUCTION

During the past decade the Internet has under-gone an impressive growth and has reached very highlevels of penetration into homes and businesses. Thishas lead to a radical shift in the possibilities it offersand new applications such as (illegal) file sharing andcollective computation have appeared. Many of theseapplications, mostly due to legal pressure, have ob-tained a truely peer-to-peer (P2P) character, in thatthey are fully decentralized, extremely fault tolerantand scalable.

These systems and their success have contributedto revitalizing the interest of the scientific communityin fully decentralized, scalable, robust distributed sys-tems, since they have many legitimate applications aswell, such as content distribution networks, sensor net-works, network monitoring, distributed data mining,and so on.

In the past years, we have worked in this areadeveloping several P2P algorithms for data aggrega-tion [9, 10, 12, 14, 16], overlay network topology man-agement [6,7,13,15,17], peer sampling [8,19] and loadbalancing [11].

We have also worked on an integrated frameworkwhere these components can be combined together ina natural way [3, 4, 11]. Finally, we have attemptedto distill some of the main design ideas we applied inthe form of design patterns [1, 2], that capture basicapproaches to achieve certain functionalities based onfully decentralized and local communication models.

In the following we briefly discuss some examplesto illustrate our approach to P2P protocol design.

EXAMPLE ALGORITHMS

Our algorithms are based on the gossip-basedparadigm. Gossip-style protocols are attractive sincethey are extremely robust to both computation andcommunication failures. They are also extremely re-sponsive and can adapt rapidly to changes in the un-derlying communication structure without any addi-tional measures.

The skeleton of a generic gossip-based protocol isshown in Figure 31. Each node possesses a local state

and executes two different threads. The active oneperiodically initiates an information exchange with apeer node selected randomly, by sending a messagecontaining the local state and waits for a responsefrom the selected node. The passive thread waits formessages sent by an initiator and replies with its localstate.

Method update builds a new local state based onthe previous local state and the state received dur-ing the information exchange. The output of update

depends on the specific function implemented by theprotocol. The local states at the two peers after aninformation exchange are not necessarily the same,since update may be non-deterministic or may pro-duce different outputs depending on which node is theinitiator.

In the following we describe example instantia-tions we have developed, indicated by the gray com-ponents in Figure 32, that illustrates the dependencerelations between these and various other existing orplanned components.

NEWSCAST

In newscast [8], the state of a node is given bya partial view, which is a set of peer descriptors witha fixed size c. A peer descriptor contains the addressof the peer, along with a timestamp corresponding tothe time when the descriptor was created.

Method getPeer returns an address selectedrandomly among those in the current partial view.Method update merges the partial views of the twonodes involved in an exchange and keeps the c fresh-est descriptors, thereby creating a new partial view.New information enters the system when a node sendsits partial view to a peer. In this step, the node al-ways inserts its own, newly created descriptor into thepartial view. Old information is gradually and auto-matically removed from the system and gets replacedby newer information. This feature allows the proto-col to “repair” the overlay topology by forgetting deadlinks, which by definition do not get updated becausetheir owner is no longer active.

In newscast, the overlay topology is defined bythe content of partial views. We have shown in [8] thatthe resulting topology has small diameter and is veryclose to a random graph with out-degree c. Accordingto our experimental results, choosing c = 20 is alreadysufficient for very stable and robust connectivity. Wehave also shown that, within a single cycle, the num-ber of exchanges per node can be modeled through arandom variable with the distribution 1 + Poisson(1).The implication of this property is that no node ismore important (or overloaded) than others.

T-MAN

Another instantiation of the gossip skeleton we de-

do foreverwait(T time units)p← getPeer()send s to psp ← receive(p)s← update(s, sp)

(a) active thread

do foreversp ← receive(*)send s to sender(sp)s← update(s, sp)

(b) passive thread

Figure 31. The skeleton of a gossip-based protocol.Notation: s is the local state, sp is the state of thepeer p.

50

Page 52: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

structured topology

T−Mandata aggregation

load balancingunstructured topology

newscast

monitoring

control

clustering

sortingsearch

Figure 32. Dependence relations between compo-nents.

veloped is T-Man [7], a protocol for creating a largeclass of topologies. The idea behind the protocol isvery similar to that of newscast. The difference isthat instead of using the creation date (freshness) ofdescriptors, T-Man applies a ranking function thatranks any set of nodes according to increasing dis-tance from a base node. Method getPeer returnsneighbors with a bias towards closer ones, and, sim-ilarly, update keeps peers that are closer, accordingto the ranking.

Figure 33 illustrates the protocol, as it constructsa torus topology. In [7] it was experimentally shownthat the protocol converges in logarithmic time evenfor networks of 106 nodes and for other topologies in-cluding rings and binary trees. With the appropriateranking function, T-Man can also be used to sort aset of numbers.

T-Man relies on another component for generat-ing an initial random topology which is later evolvedinto the desired one. In our case this service is pro-vided by newscast.

GOSSIP-BASED AGGREGATION

In the case of gossip-based aggregation [10,12,16],the state of a node is a numeric value. In a practicalsetting, this value can be any attribute of the environ-ment, such as the load or the storage capacity. Thetask of the protocol is to calculate an aggregate valueover the set of all numbers stored at nodes. Althoughseveral aggregate functions may be computed by ourprotocol, in this paper we provide only the details forthe average function.

In order to work, this protocol needs an overlayprotocol that provides an implementation of methodgetPeer. Here, we assume that this service is pro-vided by newscast, but any other overlay could beused.

To compute the average, method update(a, b)must return (a+ b)/2. After one state exchange, thesum of the values maintained by the two nodes doesnot change, since they have just balanced their values.So the operation does not change the global averageeither; it only decreases the variance over all the esti-mates in the system.

In [10] it was shown that if the communicationtopology is not only connected but also sufficientlyrandom, at each cycle the empirical variance com-puted over the set of values maintained by nodes is re-duced by a factor whose expected value is 2

√e. Most

importantly, this result is independent of the networksize, confirming the extreme scalability of the proto-col.

In addition to being fast, our aggregation protocolis also very robust. Node failures may perturb thefinal result, as the values stored in crashed nodes arelost; but both analytical and empirical studies haveshown that this effect is generally marginal [16]. Aslong as the overlay network remains connected, linkfailures do not modify the final value, they only slowdown the aggregation process.

NOTES ON COMBINING THE BUILDINGBLOCKS

The combination of the building blocks is done inthe traditional way: a building block has a local inter-face (within one node) towards the other components,and it has a protocol and an implementation asso-ciated with it. The implementation can differ overdifferent nodes, just like the local interface. For thisreason, we have focused on protocols in the above dis-cussion. Nodes using the same protocol (for example,aggregation) form a “layer” in the system. This, how-ever, is not a layer in the usual sense: we allow forarbitrary dependency relations between the buildingblocks. In general, the directed graph that describesthe dependencies (such as the example shown in Fig-ure 32) will not contain cycles, however, this is notstrictly required. Two “layers” can mutually dependon each other’s services; for instance, in a bootstrap-ping phase when they can catalyze each other’s per-formance.

Having said that, we need to mention one excep-tion. There is a “lowest layer” in our framework,which in a sense represents the group abstraction: theset of nodes that form the domain of the other com-ponents. This layer is the random network compo-nent, which provides the peer sampling service (seeSection II. and [8]). The main requirement for thisservice is that it must return all nodes with equalprobability, in particular, no nodes are to be excludedforever. The peer sampling service is used to supportand bootstrap other services like aggregation or struc-tured topologies.

Finally, the aspect of time-scale should also benoted. While all of the protocols are based on thescheme given in Figure 31, the waiting time T can bedifferent for different building blocks. This degree offreedom allows for certain architectures that otherwisewould not be possible. For example, if an up-to-dateaggregate value is needed “instantly” according to thetimescale of a relatively slow layer, like load balancing,then we can simply apply aggregation at a relativelyfaster timescale.

OPEN SOURCE SOFTWARE

We did project administrating and developing(with Alberto Montresor) for the PeerSim open sourceproject that develops a simulator for large scale peer-to-peer algorithms and networks [18]. The numberof times the simulator has been downloaded now ap-proaches 5000.

CONFERENCE ORGANIZATION ANDEDITING

We involved in organizing the invitation-onlyworkshop “International Workshop on Self-∗ Prop-erties in Complex Information Systems”, in Berti-noro, Italy, in 2004, with Ozalp Babaoglu, AlbertoMontresor, Christof Fetzer, Aad van Moorsel, StefanoLeonardi and Maarten van Steen. After the workshopwe edited a post-proceedings [5].

51

Page 53: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

after 2 cycles after 3 cycles after 4 cycles after 7 cycles

Figure 33. Illustrative example of constructing a torus over 50 × 50 = 2500 nodes, starting from a uniformrandom graph: 20 random entries in each view, with m = 20, ψ = 10 and K = 4.

We also took part in organizing the “TheFourth International Workshop on Engineering Self-Organizing Applications (ESOA’06)” togeather withSven Brueckner, Salima Hassas and Dan Yamins. Theworkshop was a satellite workshop of the “2006 Inter-national Conference on Autonomous Agents and Mul-tiagent Systems” in Hakodate, Japan.

With Ozalp Babaoglu and Robert Laddaga, weedited a special issue of “IEEE Intelligent Systems”,published as volume 21, number 2, in 2006. Thetheme of the issue was “Self-Management throughSelf-Organization in Information Systems”.

PROGRAM COMMITTEE MEMBER

1. IEEE Conference on Peer-to-Peer Computing(P2P) 2006 and 2007

2. IEEE Congress on Evolutionary Computation(CEC) 2007 special session on EC for decen-tralized systems

3. International Conference on Parallel Processing(ICPP) 2007, P2P track

4. International Conference on Computer Com-munications and Networks (ICCCN) 2006 and2007, P2P track

5. Workshop on Data Processing in Ubiquitous In-formation System (DPUbiq) 2007

6. Workshop on Modeling, Simulation andOptimization of Peer-to-peer environments(MSOP2P) 2007

7. Workshop on Multi-Agents for modeling Com-plex Systems (MA4CS) 2006

8. International Conference on Bio inspired Mod-els of Network, Information and ComputingSystems (BIONETICS) 2006

9. European Conference on Parallel Computing(Euro-Par) 2005 and 2006, vice chair of topic:Peer-to-Peer and Web Computing

10. IEEE International Workshop on Self-ManagedNetworks, Systems and Services(SelfMan) 2006

11. International Conference on Distributed Com-puting Systems (ICDCS) 2006, P2P track

12. International Workshop on Security and Trustin Decentralized/Distributed Data Structures(STD3S) 2006

13. IEEE Workshop on Stochasticity in DistributedSystems (StoDiS) 2005

14. Engineering Self-Organising Applications(ESOA) 2005

15. Socially Inspired Computing Symposium at theAISB convention on Social Intelligence andInteraction in Animals, Robots And Agents(AISB SIC) 2005

REFERENCES

[1] Ozalp Babaoglu, Geoffrey Canright, AndreasDeutsch, Gianni Di Caro, Frederick Ducatelle,Luca Gambardella, Niloy Ganguly, Mark Jela-sity, Roberto Montemanni, and Alberto Montre-sor. Design patterns from biology for distributedcomputing. In Proceedings of the European Con-ference on Complex Systems (ECCS’05), Paris,France, November 2005. on CD-ROM.

[2] Ozalp Babaoglu, Geoffrey Canright, AndreasDeutsch, Gianni A. Di Caro, Frederick Ducatelle,Luca M. Gambardella, Niloy Ganguly, Mark Je-lasity, Roberto Montemanni, Alberto Montresor,and Tore Urnes. Design patterns from biologyfor distributed computing. ACM Transactionson Autonomous and Adaptive Systems, 1(1):26–66, September 2006.

[3] Ozalp Babaoglu, Mark Jelasity, Anne-Marie Ker-marrec, Alberto Montresor, and Maarten vanSteen. Managing clouds: A case for a freshlook at large unreliable dynamic networks. ACMSIGOPS Operating Systems Review, 40(3):9–13,2006.

[4] Ozalp Babaoglu, Mark Jelasity, and AlbertoMontresor. Grassroots approach to self-management in large-scale distributed systems.In Jean-Pierre Banatre, Pascal Fradet, Jean-Louis Giavitto, and Olivier Michel, editors,Unconventional Programming Paradigms (UPP2004), volume 3566 of Lecture Notes in ComputerScience, pages 286–296. Springer-Verlag, 2005.

[5] Ozalp Babaoglu, Mark Jelasity, Alberto Montre-sor, Christof Fetzer, Stefano Leonardi, Aad vanMoorsel, and Maarten van Steen, editors. Self-Star Properties in Complex Information Systems,volume 3460 of Lecture Notes in Computer Sci-ence, Hot Topics. Springer-Verlag, May 2005.

[6] Marco A. Boschetti, Mark Jelasity, and VittorioManiezzo. A fully distributed Lagrangean meta-heuristic for a P2P overlay network design prob-lem. In Proceedings of the Sixth MetaheuristicsInternational Conference (MIC2005), 2005. ex-tended abstract, on CD-ROM.

[7] Mark Jelasity and Ozalp Babaoglu. T-Man:Gossip-based overlay topology management. In

52

Page 54: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Sven A. Brueckner, Giovanna Di Marzo Seru-gendo, David Hales, and Franco Zambonelli, edi-tors, Engineering Self-Organising Systems: ThirdInternational Workshop (ESOA 2005), RevisedSelected Papers, volume 3910 of Lecture Notes inComputer Science, pages 1–15. Springer-Verlag,2006.

[8] Mark Jelasity, Rachid Guerraoui, Anne-MarieKermarrec, and Maarten van Steen. The peersampling service: Experimental evaluation ofunstructured gossip-based implementations. InHans-Arno Jacobsen, editor, Middleware 2004,volume 3231 of Lecture Notes in Computer Sci-ence, pages 79–98. Springer-Verlag, 2004.

[9] Mark Jelasity, Wojtek Kowalczyk, and Maartenvan Steen. An approach to massively distributedaggregate computing on peer-to-peer networks.In Proceedings of the 12th Euromicro Confer-ence on Parallel, Distributed and Network-BasedProcessing (PDP’04), pages 200–207, A Coruna,Spain, 2004. IEEE Computer Society.

[10] Mark Jelasity and Alberto Montresor. Epidemic-style proactive aggregation in large overlay net-works. In Proceedings of The 24th InternationalConference on Distributed Computing Systems(ICDCS 2004), pages 102–109, Tokyo, Japan,2004. IEEE Computer Society.

[11] Mark Jelasity, Alberto Montresor, and OzalpBabaoglu. A modular paradigm for buildingself-organizing peer-to-peer applications. In Gio-vanna Di Marzo Serugendo, Anthony Karageor-gos, Omer F. Rana, and Franco Zambonelli, ed-itors, Engineering Self-Organising Systems, vol-ume 2977 of Lecture Notes in Artificial Intelli-gence, pages 265–282. Springer, 2004. invited pa-per.

[12] Mark Jelasity, Alberto Montresor, and OzalpBabaoglu. Gossip-based aggregation in large dy-namic networks. ACM Transactions on Com-puter Systems, 23(3):219–252, August 2005.

[13] Mark Jelasity, Alberto Montresor, and OzalpBabaoglu. The bootstrapping service. In Proceed-ins of the 26th International Conference on Dis-tributed Computing Systems Workshops (ICDCSWORKSHOPS), Lisboa, Portugal, 2006. IEEEComputer Society. International Workshop onDynamic Distributed Systems (IWDDS).

[14] Wojtek Kowalczyk, Mark Jelasity, and A. E.Eiben. Towards data mining in large and fullydistributed peer-to-peer overlay networks. InTom Heskes, Peter Lucas, Louis Vuurpijl, andWim Wiegerinck, editors, Proceedings of The15th Belgian-Dutch Conference on Artificial In-telligence (BNAIC’03), pages 203–210. Univer-sity of Nijmegen, 2003.

[15] Vittorio Maniezzo, Marco A. Boschetti, andMark Jelasity. An ant approach to mem-bership overlay design. In Marco Dorigo,Mauro Birattari, Christian Blum, Luca M.Gambardella, Francesco Mondada, and ThomasStutzle, editors, Ant Colony Optimization andSwarm Intelligence, 4th International Workshop(ANTS 2004), volume 3172 of Lecture Notes inComputer Science, pages 37–48. Springer-Verlag,2004.

[16] Alberto Montresor, Mark Jelasity, and OzalpBabaoglu. Robust aggregation protocols for

large-scale overlay networks. In Proceedings ofThe 2004 International Conference on Depend-able Systems and Networks (DSN), pages 19–28,Florence, Italy, 2004. IEEE Computer Society.

[17] Alberto Montresor, Mark Jelasity, and OzalpBabaoglu. Chord on demand. In Proceedingsof the Fifth IEEE International Conference onPeer-to-Peer Computing (P2P 2005), pages 87–94, Konstanz, Germany, August 2005. IEEEComputer Society.

[18] PeerSim. http://peersim.sourceforge.net/.

[19] Spyros Voulgaris, Mark Jelasity, and Maartenvan Steen. A robust and scalable peer-to-peergossiping protocol. In Gianluca Moro, ClaudioSartori, and Munindar P. Singh, editors, Agentsand Peer-to-Peer Computing: Second Interna-tional Workshop, AP2PC 2003, volume 2872 ofLecture Notes in Artificial Intelligence, pages 47–58. Springer, 2004.

III. SPEECH TECHNOLOGY

During the period 2003-2006 our speech technologyteam achieved many new results both in inventingnovel speech recognition related algorithms and inconstructing working speech recognition systems forHungarian. Two of our colleagues obtained theirPh.D. degree from the results of this research [10,48].The most recent and probably most important devel-opment was a 3-year IKTA-6 project for the designand implementation of a medical dictation system.

SPEECH IMPEDIMENT THERAPY

In 2004 the IKTA-4 project for the development ofthe ”SpeechMaster” speech impediment therapy sys-tem ended, and the software was made available tomany elementary schools and speech therapy insti-tutes for testing. Since then we have received a lotof feedback, and teachers seem to be very satisfiedwith the results achieved thanks to the application ofthe software in both reading teaching and speech im-pediment therapy. We published numerous papers onthe pedagogical, linguistic and technological aspectsof ”SpeechMaster” [6,8,14,16,17, 20, 21, 23, 24, 26–28,30,31,40,41,43,46].

SPEECH RECOGNITION RESEARCH

We have continued the development of our mod-ular speech recognition system ”OASIS”. Most im-portantly, it was extended with a statistical languagemodel, so we are now able to conduct experiments onrealistic continuous speech recognition tasks. Besidesits original segment-based acoustic model, the systemwas adapted to be able to work following the conven-tional frame-based scheme as well. Huge efforts weremade to investigate and understand the similaritiesand differences between the segment-based and theframe-based acoustic modelling technique [29]. Quiterecently we experimented with the hybrid HMM/ANNtechnology in acoustic modelling, and compared itsbehavior with our conventional ANN-based segmen-tal modelling scheme [32, 34, 49]. We investigatedseveral search space pruning techniques in order toobtain a faster and more efficient decoding perfor-mance [2, 5, 19, 22, 25, 36, 47]. Our colleagues ex-perimented with novel types of machine learning al-gorithms [12, 35] and knowledge source combinationtechniques [1,3,9,15,26] to achieve the highest possi-ble phone recognition performance. On the acoustic

53

Page 55: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

side the so-called modulation or 2D-cepstum featureswere introduced to our system, and were shown toyield a noticeable improvement [42].

DATABASE CONSTRUCTION

In 2004 the Department of Informatics at the Uni-versity of Szeged and the Laboratory of Speech Acous-tics of the Budapest University of Technology andEconomics began a project with the aim of collect-ing and/or creating the basic resources needed for theconstruction of a continuous dictation system for Hun-garian. The project lasted for three years (2004-2006),and was financially supported by the national fundIKTA-056/2003. To support the training of dictationsystems, the project included the creation of a largespeech corpus of phonetically rich sentences that al-lows the training of general-purpose dictation systems.Hence in the first phase of the project we designed,assembled and annotated a speech database calledthe MRBA (”Hungarian Reference Speech Database”)corpus [18]. The contents of the database were de-signed by the Laboratory of Speech Acoustics, basedon the phone and diphone statistics of a phoneticallytranscribed large text corpus. From this corpus 1992sentences and 1992 words were selected, and then theywere recorded from 332 speakers, each reading 12 sen-tences and 12 words. Both teams participated in thecollection of the recordings, which was carried out infour big cities. The sound files were cleaned up and an-notated at the Laboratory of Speech Acoustics, whilethe Research Group on Artificial Intelligence manu-ally segmented and labelled one third of the files atthe phone level. This part of the corpus is intendedto support the initialization of phone models.

CONSTRUCTION OF A MEDICAL DICTA-TION SYSTEM

Besides the collection of a speech corpus, theIKTA project also contained the creation of a proto-type dictation system. To make the task more man-ageable, especially the language modelling part, we re-stricted the target domain of the dictation to a specifictype of medical report. Although this task is clearlyeasier than general dictation, we chose this applica-tion area with the intent of assessing the capabilitiesof our technologies. Depending on the findings, welater hope to extend the system to more general dic-tation domains. As our team focused on the task ofthe dictation of thyroid scintigraphy medical reports,we summarize these results in the following [37–39,42].

At the level of acoustic modelling we have beenexperimenting with two quite different technologies.One of these is a quite conventional Hidden MarkovModel (HMM) decoder that works with the usual mel-frequency cepstral coefficient (MFCC) features.Thephone models applied have the usual 3-state left-to-right topology and are monophone models, that is nocontext-dependent models were tested in the system.The decoder built on these HMM phone models per-forms a combination of Viterbi and multi-stack decod-ing. For speed efficiency it contains several built-inpruning criteria. With the proper choice of param-eters the decoder on a typical PC runs faster thanreal-time on the medical dictation task.

Our alternative, experimental acoustic model em-ploys the HMM/ANN hybrid technology. The ba-sic difference between this and the standard HMMscheme is that here the probabilities are modelled by

Artificial Neural Networks (ANNs) instead of the con-ventional Gaussian mixtures (GMM). As ANNs seemto be more capable of modelling the observation con-text than GMMs, hybrid models are usually trainedover longer time windows. Knowing that the modu-lation components play an important role in humanspeech perception, a frequency analysis over the fea-ture trajectories seems to be a reasonable representa-tion technique. We apply this analysis to the cepstralcoefficients, that produces the so-called 2D-cepstrum.

In order to construct the domain-specific languagemodels we got 9231 medical reports from the Depart-ment of Nuclear Medicine of the University of Szeged.These thyroid scintigraphy reports were written us-ing various software packages during 1998 to 2004, sofirst of all we had to convert them to a common for-mat, followed by several steps of routine error correc-tion. After this the corpus contained approximately2500 different word forms, so we were confronted witha medium-sized vocabulary dictation task. Thanksto this limited vocabulary we could avoid the use ofa morphological model. Although 2500 words couldbe easily managed even by a simple list (‘linear lexi-con’), we organized the words into a lexical tree wherethe common prefixes of the lexical entries are shared.Apart from storage reduction advantages, the prefixtree representation also speeds up decoding, as it elim-inates redundant acoustic evaluations.

The limited size of the vocabulary and the highlyrestricted (i.e. low-perplexity) nature of the sentencesused in the reports allowed us to create very efficientn-grams. The system applies 3-grams by default, butit is able to ‘back off’ to smaller n-grams (in the worstcase to a small ε constant) when necessary. Duringthe evaluation of the n-grams the system applies alanguage model lookahead technique.For this reasonthe lexical trees are stored in a factored form, whichallows a more efficient pruning of the search space.

Besides word n-grams we also tried construct-ing class n-grams. For this purpose the words weregrouped into classes according to their parts-of-speechcategory. The words were categorized based on theirMSD code, and we constructed the class n-grams overthese codes. In previous experiments we found thatthe application of the language model lookahead tech-nique and class n-grams brought about a 30% decreasein the word error rate when it was applied in combi-nation with our HMM-based fast decoder [39].

For testing purposes we recorded 20-20 medicalreports from 2 male and 2 female speakers. Thelanguage model applied in the tests was constructedbased on just 500 reports instead of all the 8546 wehad collected. This subset contained almost all possi-ble sentence types, so this restriction just reduced thedictionary by removing rarely occurring words (e.g.dates and disease names). Besides the HMM decoderwe tested the HMM/ANN hybrid system with the con-ventional features and the 2D-cepstrum features aswell. The results are listed in Table 3 below. As canbe seen, each configuration performed well above 90%,but for some reason the HMM system did not like theset of female voices. In the next part we plan to ex-tend the language model to cover all the available dataand to test the system over other dictation domainsas well. We also intend to implement speaker adapta-tion and context-dependent models within the HMMsystem and to continue our research on observationcontext modelling in the HMM/ANN system.

54

Page 56: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

Model Type Feature Set Male 1 Male 2 Female 1 Female 2

HMM MFCC + Δ + ΔΔ 97.75% 98.22% 93.40% 93.39%HMM/ANN MFCC + Δ + ΔΔ 97.65% 97.37% 96.78% 96.91%HMM/ANN 2D-cepstrum 97.88% 97.83% 96.86% 96.42%

Table 3. Word recognition accuracies of the various models and feature sets.

REFERENCES

[1] Felfoldi, L., Kocsor, A., Toth, L.: Classifier Com-bination in Speech Recognition, Periodica Poly-technica, Vol. 47, No. 1-2, pp. 125-140, 2003.

[2] Gosztolya, G., Kocsor, A., Toth, L., Felfoldi, L.:Various Robust Search Methods in a HungarianSpeech Recognition System, Acta Cybernetica,Vol. 16, No. 2, pp. 229-240, 2003.

[3] Toth, L., Kocsor, A., Kovacs, K., Felfoldi, L.: Onthe Integration of Linguistic Knowledge Sourcesin Discriminative Segment-Based Speech Recog-nizers, Proc. MSzNy 2003, pp. 169-175.

[4] Toth, L., Kocsor, A.: Harmonic Alternatives toSine-Wave Speech, Proc. Eurospeech, 2003. pp.2073-2076.

[5] Gosztolya, G., Kocsor, A.: Improving the Multi-stack Decoding Algorithm in a Segment-basedSpeech Recognizer, Proc. IEA/AIE 2003, LNAI2718, pp. 744-749, Springer Verlag, 2003.

[6] Paczolay, D., Kocsor, A., Toth, L.: Real-TimeVocal Tract Length Normalization in a Phonolog-ical Awareness Teaching System, Proc. TSD2003,pp. 309-314, 2003.

[7] Toth L., Kocsor A.: (in Hungarian) The observa-tions of the manual segmentation of the MTBAHungarian Speech Database, Beszedkutatas2003, pp. 134-146.

[8] Kocsor, A, Paczolay, D.: (in Hungarian) MachineLearning and its Application in Speech Impedi-ment Therapy, Proc. MANYE, p. 91, 2003.

[9] Toth, L., Kocsor, A., Kovacs, K., Felfoldi, L.: Onthe Integration of Linguistic Knowledge Sourcesin Discriminative Segment-Based Speech Recog-nizers, Proc. MSzNy 2003, p. 175.

[10] Kocsor, A.: Kernel-Based Feature Extractionand Speech Technology Applications, Ph.D. Dis-sertation, University of Szeged, 2003.

[11] Kocsor, A., Toth, L.: Kernel-Based Feature Ex-traction with a Speech Technology Application,IEEE Transaction on Signal Processing, Vol. 52,No. 8, pp. 2250-2263, 2004.

[12] Kocsor, A., Toth, L.: Application of Kernel-Based Feature Space Transformations and Learn-ing Methods to Phoneme Classification, AppliedIntelligence, Vol. 21, No. 2, pp. 129-142, 2004.

[13] Zsigri, Gy., Kocsor, A., Toth, L., Sejtes Gy.:Phonetic Level Annotation and Segmentation ofHungarian Speech Databases, Acta Cybernetica,Vol. 16, No. 4, pp. 659-673, 2004.

[14] Paczolay, D., Kocsor, A., Sejtes, Gy., Hegely,G.: (in Hungarian) The SpeechMaster SoftwarePackage - Aspects of Linguistics and Informatics,Alkalmazott Nyelvtudomany, Vol. IV, No. 1, pp.57-79, 2004.

[15] Toth, L., Kocsor, A., Gosztolya, G.: Tele-phone Speech Recognition via the Combinationof Knowledge Sources in a Segmental SpeechModel, Acta Cybernetica, Vol. 16, No. 4, 2004.

[16] Sejtes, Gy., Kocsor, A.: (in Hungarian) TheDatabase Specification of SpeechMaster, Alka-lmazott Nyelvtudomany, Vol. IV, No. 1, pp. 81-89, 2004.

[17] Kocsor, A., Kovacs, K.: (in Hungarian) The Us-age of the Speech-oriented Parts of SpeechMasterI., Modszertani kozlemenyek, Vol. 44, No. 5, pp.203-214, 2004.

[18] Vicsi, K., Kocsor, A., Teleki, Cs., Toth, L.: Hun-garian Speech Database for Computer-using En-vironment in Offices, Proc. MSzNy 2004, pp. 315-318.

[19] Gosztolya, G., Kocsor, A.: Aggregation Opera-tors and Hypothesis Space Reductions in SpeechRecognition, Proc. TSD 2004, LNAI 3206, pp.315-322, Springer Verlag, 2004.

[20] Sejtes, Gy., Kocsor, A.,: (in Hungarian) Innova-tion in the Teaching of Reading and Speech Im-pediment Therapy: ’SpeechMaster’, Multimediaaz oktatasban konferencia 2004, p. 26, 2004.

[21] Paczolay, D., Felfoldi, L., Kocsor, A.: Classi-fier Combination Schemes In Speech ImpedimentTherapy Systems, Proc. CSCS 2004, pp. 90-91.

[22] Gosztolya, G., Kocsor, A.: A Hierarchical Evalu-ation Methodology in Speech Recognition, Proc.CSCS 2004, pp. 48-49.

[23] Hegely, G., Kocsor, A.: (in Hungarian) The His-tory of Visual Speech Evaluation in the Hungar-ian Education of the Hearing Impaired, Alkalma-zott Nyelvtudomany, 4(2): 5-10, 2004.

[24] Kocsor, A.: (in Hungarian) A Real-time SpeakerNormalization Method and its Application inSpeechMaster, Hıradastechnika, Vol. LX., pp. 9-16, 2005.

[25] Gosztolya, G., Kocsor, A.: A Hierarchical Evalu-ation Methodology in Speech Recognition, ActaCybernetica, Vol. 17, pp. 213-224, 2005.

[26] Paczolay, D., Felfoldi, L., Kocsor, A.: Classi-fier Combination Schemes In Speech ImpedimentTherapy Systems, Acta Cybernetica, Vol. 17, pp.385-399, 2005.

[27] Kocsor, A.: Acoustic technologies in theSpeechmaster software package, Acoustic Re-view, 6(2):3-8, 2005.

[28] Kocsor, A., Bacsi, J., Mihalovics, J.: (in Hungar-ian) New Prospects in Speech Impediment Ther-apy and Teaching Reading, Gyogypedagogiaiszemle, 33(3):215-221, 2005.

[29] Toth, L., Kocsor, A., Csirik, J.: On Naive Bayesin Speech Recognition, Applied Mathematics andComputer Science, 15(2), pp. 101-108, 2005.

55

Page 57: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[30] Kocsor, A., Kovacs, K.: (in Hungarian) The Us-age of the Speech-oriented Parts of SpeechMasterII., Modszertani kozlemenyek, Vol. 45, No. 1, pp.16-25, 2005.

[31] Kocsor, A., Bacsi, J., Mihalovics, J.: (in Hungar-ian) A System for Speech Impediment Therapyand Teaching Reading: SpeechMaster, FejlesztoPedagogia, Vol. 16, No. 1, pp. 13-20, 2005.

[32] Toth, L., Kocsor, A.: Training HMM/ANN Hy-brid Speech Recognizers by Probabilistic Sam-pling, Proc. ICANN 2005, pp. 597-603.

[33] Banhalmi, A., Kovacs, K., Kocsor, A., Toth,L.: Fundamental Frequency Estimation by Least-Squares Harmonic Model Fitting, Proc. Eu-rospeech 2005, pp. 305-308.

[34] Toth, L., Kocsor, A.: Explicit Duration Mod-elling in HMM/ANN Hybrids, Proc. TSD 2005,LNAI 3658, pp. 310-317, Springer Verlag, 2005.

[35] Kocsor, A.: On Kernel Discriminant Analysesapplied to Phoneme Classification, Proc. ISNN2005, LNCS 3497, pp. 357-362, 2005.

[36] Gosztolya, G., Kocsor, A.: Speeding Up Dy-namic Search Methods in Speech Recognition,Proc. IEA/AIE 2005, LNCS 3533, pp. 98-100,Springer Verlag, 2005.

[37] Sejtes, Gy., Kocsor, A., Zsigri, Gy., Paczolay, D.,(in Hungarian) Medical ”scrivener”. Latin Wordsand Collocations in a Dictation System, Proc.MANYE 2005, p. 119.

[38] Kocsor, A., Banhalmi, A., Paczolay, D., Csirik,J., Pavics, L.: The OASIS Speech Recogni-tion System for Dictating Medical Reports, Proc.EANM’05, 2005.

[39] Kocsor, A., Banhalmi, A., Paczolay, D., (in Hun-garian) Technical Background of a System forDictating Thyroid Gland Medical Reports, ActaAgraria Kaposvariensis, 10(1):113-128, 2006.

[40] Andras Kocsor, Denes Paczolay: Speech Tech-nologies in a Computer-Aided Speech TherapySystem. Proc. ICCHP 2006: 615-622

[41] Csendes, D., Kocsor, A., Paczolay, D., Banhalmi,A.: Advanced Technology and Interface for In-teractive Speech Impediment Therapy in Proc.of e-Challenges 2006, pp. 1531-1538, 2006.

[42] Banhalmi, A., Paczolay, D., Toth, L., Kocsor, A.:First Results of a Hungarian Medical DictationProject, Proc. of IS-LTC 2006, pp. 23-26.

[43] Kocsor, A., Bacsi, J., Mihalovics, J.: (in Hun-garian) Speechmaster: computer-aided reading

teaching and speech impediment therapy, Ujpedagogiai szemle, 2006/3, pp. 108-113.

[44] Banhalmi, A., Kocsor, A., Kovacs, K., Toth, L.:Fundamental Frequency Estimation by Combina-tions of Various Methods, Proc. NORSIG 2006.

[45] Banhalmi, A., Paczolay, D., Kocsor, A.: An On-line Speaker Adaptation Method for HMM-basedASRs , Proc. CSCS 2006, pp 21-22

[46] Paczolay, D., Banhalmi, A., Kocsor, A.: Ro-bust Recognition of Vowels In Speech Impedi-ment Therapy Systems, Proc. CSCS 2006, pp 82-83.

[47] Kocsor, A., Gosztolya, G.: Application of FullReinforcement Aggregation Operators in SpeechRecognition, Proc. RASC 2006, pp. 109-116.

[48] Toth, L.: Posterior-Based Speech Models andtheir Application to Hungarian Speech Recogni-tion, Ph.D. Dissertation, Univ. of Szeged, 2006.

[49] Toth, L., Kocsor, A.: A Segment-based Inter-pretation of HMM/ANN Hybrids, accepted forComputer Speech and Language

IV. MACHINE LEARNING AND COMPU-TATIONAL LEARNING THEORY

INTRODUCTION

Machine learning and computational learning the-ory deal with the automatic acquisition of knowledgefrom data, for example, in the form of classificationor regression rules. The field developed rapidly inthe past decade, in terms of the construction of new,efficient learning algorithms, the theoretical under-standing of the possibilities and limitations of efficientlearning methods, and also in terms of the scope of ap-plication areas.

Results achieved at the Research Group on Arti-ficial Intelligence (RGAI) in the area of learning dur-ing 2003-2007 involved work in all these directions:the development of SpeechMaster, a successful soft-ware product which uses machine learning technol-ogy, research on the development of machine learningalgorithms such as kernel and support vector meth-ods, and theoretical results in various formal modelsof computational learning theory, such as theory revi-sion in query and mistake-bounded models.

SPEECHMASTER, APLLICATIONS OFMACHINE LEARNING IN SPEECHRECOGNITION

The software package SpeechMaster was devel-oped for speech impediment therapy and the teachingof reading. It is freely available at

www.inf.u-szeged.hu/beszedmester

The system uses machine learning methods as partof speech recognition technology. The objective inthe two tasks is to provide visual phonetic feedbackand to reinforce the correct association between thephoneme/grapheme pairs. A brief overview of the var-ious functionalities of the system is given in [6].

Research completed in the course of the develop-ment of the system includes a comprehensive evalu-ation of several recent machine learning algorithms,such as kernelized versions of principal componentanalysis (KPCA), independent component analysis(KICA), linear discriminant analysis (KLDA) andspringy discriminant analysis (KSDA) in the contextof speech recognition tasks [7], several of which hasbeen developed earlier at the research group. A com-parison of several learning methods for the particu-lar task of phoneme classification is given in [8]. Be-sides kernel methods, another important recent de-velopment in machine learning is the construction ofefficient techniques for combining classifiers, such asboosting. The paper [1] gives a detailed computa-tional study of the different combination methods forspeech recognition tasks, and [4] compares the combi-nation methods for natural language processing tasks.[17] discusses a sampling scheme handling the impor-tant practical problem of imbalances in training data.The paper [18] gives a general algorithmic frameworkto provide experimental evidence and explanation forthe success of Hidden Markov Model techniques in

56

Page 58: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

speech recognition, in spite of the simplistic indepen-dence assumptions inherent in the model.

MACHINE LEARNING ALGORITHMS

Convex Networks (CN), a new learning methodcombining certain attractive features of neural net-works and support vector machines (SVM), is intro-duced in [10] and developed further in [11]. Clas-sification techniques leading to simpler optimizationproblems than SVM techniques have been developedin [9]. These techniques are computationally moreefficient than SVM, but produce classifiers competi-tive with SVM and other methods, when comparedon standard benchmark data sets. Margin Maximiz-ing Discriminant Analysis (MMDA), a new feature ex-traction method, is developed in [5]. It has linear andnon-linear (kernelized) versions, has attractive com-putational features and it is competitive with otherrelated methods. The method is applied for the devel-opment of feature extraction algorithms for regressionproblems in [16]. The MMD approach is integratedwith the CVM (Core Vector Machine) method in [19].CVM is a recent approach to classification and regres-sion, which is significantly faster than SVM (SupportVector Machines) and competitive with it in learningquality.

COMPUTATIONAL LEARNING THEORY

Theory revision provides efficient concept learningalgorithms given an initial theory which is an approx-imation of the target. Several theory revision algo-rithms are presented in query models [2,14] and mis-take bounded models [13,15]. [12] considers the effecton the size of a DNF formula, of incorporating excep-tions into the formula. This problem is motivated byapplications in computational learning theory. Thepaper [3] studies learnability consequences of restric-tions on the tree width and clique width of first-orderlogic structures, by studying combinatorial parame-ters such as the Vapnik-Chervonenkis dimension andthe strong consistency dimension.

CONFERENCES ORGANIZED

13th International Conference on Inductive LogicProgramming (ILP 2003), September 29 - October 1,2003, Szeged.

Kalmar Workshop on Logic and Computer Sci-ence, October 1 - 2, 2003, Szeged.

ACKNOWLEDGEMENTS

The mentioned research tasks were supported bythe following grants.

2005-2007: NKFP 2/008/2004, Hungarian-English Machine Translator System.

2004-2006: IKTA-056/2003, The Establishment ofa Speech Corpus for General Purposes and the Devel-opment of a Speech Recognition System for MedicalReports.

2002-2004: IKTA-055/2001, Machine Learningand Its Application to Speech Impediment Therapy.

REFERENCES

[1] L. Felfoldi, A. Kocsor, L. Toth: Classifier combi-nation in speech recognition, Periodica Polytech-nica, Electrical Engineering 47 (2003), 125-140.

[2] J. Goldsmith, R. H. Sloan, B. Szorenyi, Gy.Turan: Theory revision with queries: Horn, read-once and parity formulas, Artificial IntelligenceJournal 156 (2004), 139-176.

[3] M. Grohe, Gy. Turan: Learnability and defin-ability in trees and similar structures, Theory ofComputing Systems 37 (2004), 193-220.

[4] A. Hocza, L. Felfoldi, A. Kocsor: Learning syn-tactic patterns using boosting and other classifiercombination schemes, Proceedings of the 8. Int.Conf. on Text, Speech and Dialogue (TSD 2005),Springer LNAI 3658 (2005), 69-76.

[5] A. Kocsor, K. Kovacs, Cs. Szepesvari: Marginmaximizing discriminant analysis, Proceedings ofthe 15. European Conference on Machine Learn-ing (ECML 2004), 227-238. Springer LNAI 3201,2004.

[6] A. Kocsor, D. Paczolay: Machine learning and itsnovel application in speech impediment therapy,Lexikografia (2005). (In Hungarian.)

[7] A. Kocsor, L. Toth: Kernel-based feature extrac-tion with a speech technology application, IEEETransactions on Signal Processing 52 (2004),2250-2263.

[8] A. Kocsor, L. Toth: Application of kernel-basedfeature space transformations and learning meth-ods to phoneme classification, Applied Intelli-gence 21 (2004), 129-142.

[9] K. Kovacs, A. Kocsor: Various hyperplane classi-fiers using kernel feature spaces, Acta Cybernetica16 (2003), 271-278.

[10] K. Kovacs, A. Kocsor: Classification using asparse combination of basis functions, Acta Cy-bernetica, 17 (2005).

[11] K. Kovacs, A. Kocsor: Improving a basis func-tion based classification method using feature se-lection algorithms, IEEE Int. Workshop on SoftComputing Applications (SOFA 2005).

[12] D. Mubayi, Gy. Turan, Y. Zhao: The DNF ex-ception problem, Theoretical Computer Science352 (2006), 85-96.

[13] R. H. Sloan, B. Szorenyi: Revising projectiveDNF in the presence of noise, Acta Cybernetica,accepted for publication.

[14] R. H. Sloan, B. Szorenyi, Gy. Turan: Revisingthreshold functions, Theoretical Computer Sci-ence, to appear.

[15] R. H. Sloan, B. Szorenyi, Gy. Turan: ProjectiveDNF formulas and their revision, Discrete Ap-plied Mathematics, to appear.

[16] Cs. Szepesvari, A. Kocsor, K. Kovacs: Kernelmachine based feature extraction algorithms forregression problems, 16. European Conference onArtificial Intelligence (ECAI 2004), 1091-1092.

[17] L. Toth, A. Kocsor: Training HMM/ANN hybridspeech recognizers by probabilistic sampling, In-ternational Conference on Artificial Neural Net-works (ICANN 2005), 597-603. Springer LNCS3696.

[18] L. Toth, A. Kocsor, J. Csirik: On Naive Bayesin speech recognition, Applied Mathematics andComputer Science 15 (2005), 101-108.

57

Page 59: Report on the Research at the Institute of Informatics of ... · Summer School on Image Processing, SSIP, Szeged, 2004, 2005, and 2006. Veszpr´em Optimization Conference: Advanced

[19] I. W. Tsang, A. Kocsor, J. T. Kwok: DiversifiedSVM ensembles for large data sets, Proceedings ofthe 17. European Conference on Machine Learn-ing (ECML 2006), pp.792-800, Berlin, Germany,September 2006.

58