Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Size: px
Start display at page:

Download "Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc"

Transcription

1 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl Switching System Engineering & Technology Reserch Center, Zhengzhou, Chin Keywords: regulr expression, deep pcket inspection, grouping lgorithm, lbel propgtion. Abstrct. Regulr expression grouping is the prcticl wy to ddress the stte explosion problem of Deterministic Finite Automton (DFA). Previous grouping lgorithms hve poor grouping time, nd difficult to meet ppliction needs. In this work, we present n efficient regulr expression grouping lgorithm bsed on lbel propgtion. Through the deterministic initil grouping nd bsed on similrity of the propgtion process to chieve fster convergence. Experimentl results show tht. Compred with other lgorithms, GBLP lgorithm hs the minimum totl number of sttes nd grouping time for the sme number of groups. Introduction. With the incresing network security threts, Deep Pcket Inspection (DPI) is becoming more nd more importnt in security ppliction nd reserch. It describes the threts (e.g. spm, virus or nonymous intrusion) by defult description of the signtures, to identify the network flows with mlicious informtion in the pylod of their pckets. Nowdys, regulr expressions hve grdully become the min description lnguge of DPI signtures owing to its expressiveness nd flexibility. Regulr expression is usully chieved by Finite Automt (FA). The Deterministic Finite Automt (DFA) with its liner nd predictble mtching speed becomes the reserch hotspot. However, the DFA my require huge mount of memory become of the stte explosion problem. The number of DFA sttes cn be exponentil in size of regulr expression s shown in Fig.1. So mny lgorithms for the DFA storge optimiztion hve been proposed. V PV [^e] P Q b R c S d X T [^g] g PX Z ef.*gh SV d TV [^ce] e QX b RX g PY h h c RW [^g] g Y b.*cd RV f f f [^c] b PW W [^] QV [^e] e e c SX d TX [^cg] RY h PZ RZ /b.*cd/ nd /ef.*gh/ Fig.1 Exmple of stte explosion But in the current er of big dd, the scle nd complexity of the DPI rule set is lso incresing. The problem of the DFA stte explosion my cuse it difficult to generte. The rule set of L7-Filter is compiled to DFA which needs more thn 16GB of memory. The generl mchine is difficult to chieve. At this cse, most of the storge optimiztion lgorithms (D2FA, &FA, etc.) cnnot be pplied. But grouping lgorithm cn effectively void infltion between regulr expressions. However, s the demnd for the rel-time detection under the high-speed network environment is grdully prominent. The grouping time of the existing regulr expression grouping lgorithm is The uthors - Published by Atlntis Press 1054

2 longer nd it is difficult to be pplied in prctice. Therefore, in this work, n efficient regulr expression grouping lgorithm bsed on lbel propgtion (GBLP) is designed. It cn chieve the effective blnce between grouping time nd grouping effect. Finlly, we implement the GBLP lgorithm nd the other 3 kinds of grouping lgorithms in L7-Filter, Snort nd Cisco security ppliction. The experimentl results bsed on prcticl rule sets show tht under the sme number of clusters, the GBLP lgorithm hs improved the totl sttes number nd grouping time, especilly on grouping time reduced from 2 to 5 times. Relted Work DFA min memory consumption is n n (n is the number of stte, is lphbet of ASCII) of the Stte Trnsition Tble (STT). It occupies more thn 95% of the DFA storge spce. Therefore, the method of solving the DFA memory cn be divided into two directions: reduced stte trnsition edge [1-4] nd reduced stte number [5-10]. Ech of these Sttes is corresponding to the 256 trnsition edges, so the compression of the edge is limited. The reduction in the number of sttes cn void the spce explosion by the nture. In this work, we choose to design fst nd efficient lgorithm to reduce the number of sttes. F. Yu et l. [5] first proposed regulr expression grouping lgorithm, clled mdfa. However, the lgorithm only uses the mutul reltionship between the regulr expressions by 0 nd 1. Grouping strtegy is too simple. Becchi et l. [6] used the grouping method of dichotomy to chieve fster grouping time, but the prtil grouping effect is scrificed. Q. Xu et l. [7] defined the Dilte Rtio (DR) to describe the expnsion effect of regulr expressions, nd put forwrd kind of selective clustering lgorithm REGADG to improve the grouping effect. But the lgorithm my lose informtion. Rohrer [8] nd Fu Z [9] bstrcted the grouping problem, nd combined with the existing optimiztion lgorithm (integer liner progrmming, simulted nneling, genetic lgorithm nd nt colony optimiztion lgorithm) to chieve better effect of grouping. But even though Fu Z designed DFA estimtion lgorithm to ccelerte the execution speed, grouping time is still higher thn the trditionl mdfa. Liu Tingwen [10] proved tht the optimum k-grouping problem of regulr expression set ws NP-hrd, nd the locl optimiztion lgorithm GRELS ws designed. But the grouping time hs not been improved significntly. Obviously, the previous regulr expression grouping lgorithm hs grdully improved the grouping effect, less memory footprint. However, with the incresing demnd for network security nd service qulity, the importnce of dt rel-time detection is lso more prominent. And the grouping time of the grouping lgorithm is closely relted to detection efficiency. At the sme time, the nlysis found tht the previous grouping methods usully dopt the method of rndom trverse nd multiple itertions. And no deterministic initil group ws given. GBLP Algorithm. The regulr expression grouping is to divide the regulr expression set into multiple sub sets. The gol is to minimize the DFA expnsion sttes number. The lbel propgtion lgorithm is simple nd esy to implement. The implementtion time is short, especilly suitble for lrge scle dense grph grouping. Therefore, this work will reference the ide of lbel propgtion. We optimize the distribution of the initil lbel nd the trnsmission process. Finlly, the reduction of grouping time is relized in the premise of effective grouping. In prcticl ppliction, the prllel processing cpbility of hrdwre pltform will limit the mximum group number. In generl, the number of groups is determined by the mximum prllel processing cpbility of the device. So we set the known number of clusters K, minimizing the totl number of sttes. Introduction to Lbel Propgtion Algorithm. Lbel propgtion lgorithm [11] (LPA) is proposed by Zhu et l. in Its bsic ide is to construct smple connection digrm, which gives different initil lbel to ech vertex. Then ccording to the principle of voting, the lbel tht hs the lrgest number of tgs in the djcent 1055

3 vertices is trnsmitted to the vertex. Finlly, the sme lbel vertices re divided into group. Lbel propgtion lgorithm including initiliztion, lbel updte, nd dd the sme tg vertex to the sme group three prts. Ech vertex is ssigned unique lbel. And the optiml group is chieved fter multiple itertions. But in the process of trnsmission, lrge number of smll groups cn be generted. Mny meningful lbels re fuzzy. At the sme time, the communiction effect bsed on the principle of simple voting is poor. And simple voting principle is not suitble for complete grph of connected to ech other. Therefore, lbel propgtion lgorithm cnnot be directly pplied to the regulr expression grouping. We design fst nd efficient regulr expression grouping lgorithm by improving it. Minly includes two steps: deterministic initil group selection nd lbel propgtion bsed on similrity. Design nd Implementtion of GBLP. In view of regulr expression set R= {r 1, r 2,..., r n }, we construct undirected complete grph G= (V, E). Which V= {v 1, v 2,..., v n } for vertex set, where ech vertex v i represents regulr expression r i. Every pir of vertices v i nd v j hs n edge weight e ij. In order to describe the reltionship between the regulr expressions, the concept of the Expnsion Rte (ER) is introduced s the edge weight. Definition 1: For ny regulr expression r i nd r j, ER formul is s follows: Trr ( i, j) ER (r,r)= i j Tr ( ) + Tr ( ) (1) i j T(r i ) nd T(r j ) respectively corresponding to the regulr expression r i nd r j compiled into stte of DFA. T(r i, r j ) sid the regulr expression r i nd r j combined generted DFA stte number. When ER > 1, the corresponding regulr expression is merged nd the expnsion is generted. The greter the ER is, the more serious the stte expnds. The corresponding regulr expressions should be divided into different groups. When ER is less thn or equl to 1, sid the corresponding two regulr expressions do not interct. ER is close to 0, the corresponding regulr expressions re more likely to be clssified into the sme group. A. Initil Group Selection. The originl lbel propgtion lgorithm ssigns ech vertex unique lbel, which leds to mny smll groups in the itertive process. The meningful lbel cnnot be emerged lrge number t first. This reduces the convergent speed nd ccurcy limit problems. In the cse of the known pcket number K, the "criticl" K vertices my be selected s the initil group nd the initil tg is given. This cn effectively reduce the number of lbels, speed up the convergence rte, nd improve the ccurcy of the group. The selection of "criticl" K vertices, nmely choose K nd ll the vertices do not produce or produce the expnsion of the stte of the vertices s little s possible. The concept of Pek Intensity (PI) is introduced in this pper to describe the expnsion effect of the regulr expression in the vertices. Definition 2: For regulr expression r i corresponding vertex v i, PI formul is s follows: j= n PI( v ) = ER( r, r ) (2) i i j j= 1, i j PI is the weight of ll edges on the corresponding vertices. The greter the PI indictes tht the vertex nd the rest of the merger hve lrger expnsion rte. The vertex corresponds to regulr expression is more complex. On the contrry, the smller PI vertex corresponds to regulr expression is more simple, the smller the stte expnsion cused by. According to the bove nlysis, we first clculte the PI of n vertices nd prioritize. Then, ccording to the PI vlue, the minimum K vertices re selected s the initil group G i nd ssigned the initil lbels. B. Lbel Propgtion Grouping Process. In this process, the trditionl lbeling lgorithm is bsed on the principle of voting to select the 1056

4 common lbel. In order to void the lbel shocks, usully dopt the strtegy of synchronous to updte the lbel. The updting formul is s follows: C ( t) = f( C ( t),, C ( t), C ( t 1),, C ( t 1)) (3) vi vi1 vi( i 1) vi( i+ 1) vin Among them, v i1,, v in is the vertex v i of ll the djcent vertices, v i1,, v i(i-1) indictes tht the vertex of the lbel hs been updted before this itertion, v i(i+1),, v in sid the itertion of the lbel hs not updted the vertex, f function s described bove. But it cnnot be directly used in here. Ech vertex is connected to ech other in complete grph G. And we cn chieve the minimum of the expnsion stte for the purpose of grouping. So we need to modify it. The concept of vertex Similrity (S) is introduced. Definition 3: For vertex v i nd v j, S formul is s follows: 1 Sv ( i, vj) = ER( r, r ) i j (4) The S (v i, v j ) between v i nd v j is the reciprocl of ER (r i, r j ). Obviously, the greter the similrity between vertices, the corresponding two vertices should be for the sme group. So in order to chieve the lest number of expnsion stte. We design method of lbel propgtion bsed on similrity, lbel propgtion formul is: C ( t) = gc ( ( t),, C ( t), C ( t 1),, C ( t 1)) (5) vi vi1 vi( i 1) vi( i+ 1) vin In the bove formul, g returns the sum of the similrity nd the mximum of the neighbor vertices in the vertex v i. If the sum of similrity is equl, then rndomly choose one. The propgtion method cn effectively limit the spred of the lbel rndomness, nd improve the convergence precision. C. Algorithm Implementtion. Bsed on the bove two steps, the finl group ccording to the lbel informtion on ech vertex. Lbel propgtion grouping lgorithm steps re s follows: Step1: Clculte the PI of ech vertex in the complete grph G. Since the childhood prioritize put in X; Step2: Clculte the similrity between rbitrry vertices; Step3: According to the number of clusters K, PI's smllest K vertices re selected, nd the initil lbel is ssigned; Step4: Set up t =1, updte lbel, for(v i V), C ( t) = gc ( ( t),, C ( t), C ( t 1),, C ( t 1)) ; vi vi1 vi( i 1) vi( i+ 1) vin Step5: If ll vertices re ssigned lbels nd not chnge, the lgorithm ends, or set t =t+1, to Step4. Algorithm Anlysis. All kinds of regulr expression grouping lgorithms need to clculte expnsion reltionship between the rules. This step cn be considered s the preprocessing stge of the regulr expression grouping, nd the time complexity is O(n 2 ) (n number of rules in regulr expression set R). So we neglect this step in the process of nlysis. The time complexity of the grouping process is considered only. We put forwrd n effective regulr expression grouping lgorithm bsed on lbel propgtion. The initil grouping nd the lbel propgtion bsed on similrity re liner. The time complexity of the grouping process is O(n). For the previous grouping lgorithm, the expnsion reltionship needs to be clculted in ech itertion process. The time complexity is generlly O(n 2 ). Therefore the time complexity of GBLP is especilly improved. Experiment nd Anlysis. In this section, we conducted series of experiments to evlute the performnce of GBLP lgorithm. All experiments were performed on Virtul Mchine 8.0. The virtul mchine 1057

5 configurtion is s follows: opertion system: Ubuntu 11.10, internl memory: 8 GB, Intel dul core 2.5 GHz CPU. The Regulr Expression Processor [6] is used to clculte the ccurte number of sttes of regulr expressions distribution, s the metric of memory consumption. Three rule sets picked from L7-Filter Snort nd commercil corportion Cisco re used, s shown in Tble 1. Tble 1. RULE SETS INFORMATION Rule sets # of RegEx % RegEx w/ wildcrds (*,+) Snort-158 L7-Filter-80 Cisco We generted mdfa [5], Becchi [6], GRELS [10] nd GBLP respectively with different rule sets in Tble 1. We compred them on the totl sttes number of the DFAs constructed from groups nd grouping time. Tble 2. GROUPING RESULTS FOR Snort-158 Grouping lgorithm mdfa Becchi GRELS GBLP sttes number K=5 K=6 K=7 Grouping sttes Grouping sttes Grouping time(s) number time (s) number time (s) Grouping lgorithm mdfa Becchi GRELS GBLP Grouping lgorithm mdfa Becchi GRELS GBLP Tble 3. GROUPING RESULTS FOR L7-Filter-80 K=5 K=6 K=7 sttes Grouping sttes Grouping sttes Grouping number time (s) number time (s) number time (s) Tble 4. GROUPING RESULTS FOR Cisco-233 K=5 K=6 K=7 sttes Grouping sttes Grouping sttes Grouping number time (s) number time (s) number time (s) As shown in Tble 2. On Snort-158 rule set, under the sme group number, the sttes number of mdfa lgorithm is less thn tht of the Becchi lgorithm, but the grouping time is the longest. The GRELS lgorithm of locl optimiztion on the totl number of stte hs obviously improved thn the bove two groups, but the grouping time is still longer. While GBLP lgorithm proposed in this work is the smllest in two indictors. The totl number of sttes is reduced by bout 10% compred with the GRELS lgorithm. The grouping time is reduced by more thn 47% of the Becchi lgorithm. Tble 3 shows both effectiveness nd efficiency for L7-Filter-80 rule set. Although the regulr expression of the rule set is more complex, the stte expnsion is more serious. GBLP lgorithm is compred with the current GRELS lgorithm, on the bsis of the totl number of Stte to be reduced, the grouping time is reduced by more thn hlf. As shown in Tble 4, under the sme group number, the stte number of the existing grouping lgorithm is fr greter thn the GBLP lgorithm. GBLP lgorithm runs 5 times nd 3 times fster 1058

6 thn Becchi lgorithm nd GRELS lgorithm, respectively. By the bove nlysis, in the sme number of clusters, the sttes number of GBLP lgorithm nd the grouping time re improved compred with the previous grouping lgorithm. In similr bout the complex L7-Filter Snort rule sets, GBLP lgorithm cn reduce the number of sttes slightly, nd grouping time is reduced by bout hlf. While in the Cisco security pplictions nd other simple rule sets, the lgorithm performnce is more prominent. Compred with the ltest GRELS lgorithm, the grouping time decreses by 3 times. Conclusions In view of the current high-speed network environment, the grouping time of the existing regulr expression grouping lgorithms is longer. And they re difficult to meet the needs of rel-time detection in prcticl ppliction. We propose new fst nd efficient grouping lgorithm, which is efficient regulr expression grouping lgorithm bsed on lbel propgtion (GBLP). Lern from simple nd quick lbel propgtion ides. We give method to determine the initil groups, nd to design the grouping process bsed on the similrity. The experimentl results show tht the proposed GBLP lgorithm hs less number of sttes nd shorter grouping time thn the current grouping lgorithms, which cn chieve the effective blnce between memory occupncy nd grouping time. The future work is to consider the expnsion influence of different chrcteristics, nd further improve the grouping ccurcy of the lgorithm. Literture References [1] Kumr S, Dhrmpurikr S, Yu F, et l. Algorithms to ccelerte multiple regulr expressions mtching for deep pcket inspection[j]. ACM SIGCOMM Computer Communiction Review, 2006, 36(4): [2] Becchi M, Cdmbi S. Memory-efficient regulr expression serch using stte merging[a]. 26th IEEE Interntionl Conference on Computer Communictions (INFOCOM 2007)[C]. IEEE, 2007: [3] QI Y, Wng K, Fong J, et l. FEACAN: Front-end ccelertion for content-wre network processing[a] Proceedings IEEE INFOCOM[C]. IEEE, 2011: [4] Becchi M, Crowley P. A hybrid finite utomton for prcticl deep pcket inspection[a]. Proceedings of the 2007 ACM CoNEXT conference[c]. ACM, 2007:1-12. [5] Yu F, Chen Z, Dio Y, et l. Fst nd Memory-efficient Regulr Expression Mtching for Deep Pcket Inspection[C]. ANCS 06. New York, NY, USA: ACM, 2006: [6] Becchi M, Frnklin M, Crowley P. A worklod for evluting deep pcket inspection rchitectures[c]. In: Proc. of the IISWC Pisctwy: IEEE Computer Society. IEEE,2008: [7] Xu Qin, E Yue-peng, Ge Jing-guo, et l. Efficient regulr expression compression lgorithm for deep pcket inspection[j]. Journl of Softwre, 2009,20(8): [8] Rohrer J, Atsu K, Lunteren JV, et l. Memory-Efficient distribution of regulr expressions for fst deep pcket inspection[c]. CODES+ISSS 2009 Proceedings, Grenoble, Frnce, Oct 11-16, 2009: [9] Fu Z, Wng K, Ci L, et l. Intelligent grouping lgorithms for regulr expressions in deep inspection[c]. Computer Communiction nd Networks (ICCCN), rd Interntionl Conference on. IEEE, 2014: 1-8. [10] Liu Ting-wen, Sun Yong, Bu Dong-bo, et l. 1/(1-1/k)-Optiml lgorithm for regulr expression grouping[j]. Journl of Softwre, 2012,23(9):

7 [11] Zhu X, GHAHRAMANI Z. Lerning from lbeled nd unlbeled dt with lbel propgtion[r]. Technicl Report CMU-CALD , Crnegie Mellon University,

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

Noisy Voltage Sag Signal Analysis Based on Wavelet Transformation

Noisy Voltage Sag Signal Analysis Based on Wavelet Transformation 3rd Interntionl Conerence on Mechtronics nd Industril Inormtics (ICMII 05) Noisy Voltge Sg Signl Anlysis Bsed on Wvelet Trnsormtion Min Co,,, Shilin Li, b, Qingchn Liu, c Chong Lin, d, Zhiqing M3, e* Yunnn

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata CS 432 Fll 2017 Mike Lm, Professor (c)* Regulr Expressions nd Finite Automt Compiltion Current focus "Bck end" Source code Tokens Syntx tree Mchine code chr dt[20]; int min() { flot x = 42.0; return 7;

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

CS481: Bioinformatics Algorithms

CS481: Bioinformatics Algorithms CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in

More information

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline CSCI1950 Z Comput4onl Methods for Biology Lecture 2 Ben Rphel Jnury 26, 2009 hhp://cs.brown.edu/courses/csci1950 z/ Outline Review of trees. Coun4ng fetures. Chrcter bsed phylogeny Mximum prsimony Mximum

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Encoding techniques for evading n-gram based Intrusion Detection Systems

Encoding techniques for evading n-gram based Intrusion Detection Systems Encoding techniques for evding n-grm bsed Intrusion Detection Systems Studienrbeit Moritz Bechler moritz.bechler@student.uni-tuebingen.de Universität Tübingen Wilhelm Schickrd Institut SPRING 7 5.7.2012

More information

Statistical classification of spatial relationships among mathematical symbols

Statistical classification of spatial relationships among mathematical symbols 2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

A Fast Imaging Algorithm for Near Field SAR

A Fast Imaging Algorithm for Near Field SAR Journl of Computing nd Electronic Informtion Mngement ISSN: 2413-1660 A Fst Imging Algorithm for Ner Field SAR Guoping Chen, Lin Zhng, * College of Optoelectronic Engineering, Chongqing University of Posts

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

IMAGE QUALITY OPTIMIZATION BASED ON WAVELET FILTER DESIGN AND WAVELET DECOMPOSITION IN JPEG2000. Do Quan and Yo-Sung Ho

IMAGE QUALITY OPTIMIZATION BASED ON WAVELET FILTER DESIGN AND WAVELET DECOMPOSITION IN JPEG2000. Do Quan and Yo-Sung Ho IMAGE QUALITY OPTIMIZATIO BASED O WAVELET FILTER DESIG AD WAVELET DECOMPOSITIO I JPEG2000 Do Qun nd Yo-Sung Ho School of Informtion & Mechtronics Gwngju Institute of Science nd Technology (GIST) 26 Cheomdn-gwgiro

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Video-rate Image Segmentation by means of Region Splitting and Merging

Video-rate Image Segmentation by means of Region Splitting and Merging Video-rte Imge Segmenttion y mens of Region Splitting nd Merging Knur Anej, Florence Lguzet, Lionel Lcssgne, Alin Merigot Institute for Fundmentl Electronics, University of Pris South Orsy, Frnce knur.nej@gmil.com,

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

cell 1 cell 2 cell 3 cell 4 a a

cell 1 cell 2 cell 3 cell 4 a a Frequency Assignment for Cellulr Mobile Systems Using Constrint Stisfction Techniques Mkoto Yokooy nd Ktsutoshi Hirymz y NTT Communiction Science Lbortories -4 Hikridi, Seik-cho, Sorku-gun, Kyoto 69-037

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

CS 221: Artificial Intelligence Fall 2011

CS 221: Artificial Intelligence Fall 2011 CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

On Computation and Resource Management in Networked Embedded Systems

On Computation and Resource Management in Networked Embedded Systems On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007 CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

Topic 2: Lexing and Flexing

Topic 2: Lexing and Flexing Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization ECEN 468 Advnced Logic Design Lecture 36: RTL Optimiztion ECEN 468 Lecture 36 RTL Design Optimiztions nd Trdeoffs 6.5 While creting dtpth during RTL design, there re severl optimiztions nd trdeoffs, involving

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

Data Flow on a Queue Machine. Bruno R. Preiss. Copyright (c) 1987 by Bruno R. Preiss, P.Eng. All rights reserved.

Data Flow on a Queue Machine. Bruno R. Preiss. Copyright (c) 1987 by Bruno R. Preiss, P.Eng. All rights reserved. Dt Flow on Queue Mchine Bruno R. Preiss 2 Outline Genesis of dt-flow rchitectures Sttic vs. dynmic dt-flow rchitectures Pseudo-sttic dt-flow execution model Some dt-flow mchines Simple queue mchine Prioritized

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Lexical Analysis: Constructing a Scanner from Regular Expressions

Lexical Analysis: Constructing a Scanner from Regular Expressions Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM Interntionl Journl of Innovtive Reserch in Advnced Engineering (IJIRAE) Volume1 Issue1 (Mrch 2014) A Comprison of the Discretiztion Approch for CST nd Discretiztion Approch for VDM Omr A. A. Shib Fculty

More information

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08 CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component

More information

Regular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup

Regular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup Regulr Expression Mtching with Multi-Strings nd Intervls Philip Bille Mikkel Thorup Outline Definition Applictions Previous work Two new problems: Multi-strings nd chrcter clss intervls Algorithms Thompson

More information

Qubit allocation for quantum circuit compilers

Qubit allocation for quantum circuit compilers Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Graph Exploration: Taking the User into the Loop

Graph Exploration: Taking the User into the Loop Grph Explortion: Tking the User into the Loop Dvide Mottin, Anj Jentzsch, Emmnuel Müller Hsso Plttner Institute, Potsdm, Germny 2016/10/24 CIKM2016, Indinpolis, US Who we re Dvide Mottin grph mining, novel

More information

On String Matching in Chunked Texts

On String Matching in Chunked Texts On String Mtching in Chunked Texts Hnnu Peltol nd Jorm Trhio {hpeltol, trhio}@cs.hut.fi Deprtment of Computer Science nd Engineering Helsinki University of Technology P.O. Box 5400, FI-02015 HUT, Finlnd

More information

Computing offsets of freeform curves using quadratic trigonometric splines

Computing offsets of freeform curves using quadratic trigonometric splines Computing offsets of freeform curves using qudrtic trigonometric splines JIULONG GU, JAE-DEUK YUN, YOONG-HO JUNG*, TAE-GYEONG KIM,JEONG-WOON LEE, BONG-JUN KIM School of Mechnicl Engineering Pusn Ntionl

More information

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015 Finite Automt Lecture 4 Sections 3.6-3.7 Ro T. Koether Hmpden-Sydney College Wed, Jn 21, 2015 Ro T. Koether (Hmpden-Sydney College) Finite Automt Wed, Jn 21, 2015 1 / 23 1 Nondeterministic Finite Automt

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

FPGA-Based Implementation of Genetic Algorithm for the Traveling Salesman Problem and Its Industrial Application

FPGA-Based Implementation of Genetic Algorithm for the Traveling Salesman Problem and Its Industrial Application FPGA-Bsed Implementtion of Genetic Algorithm for the Trveling Slesmn Problem nd Its Industril Appliction Ioulii Sklirov nd António B.Ferrri Deprtment of Electronics nd Telecommunictions University of Aveiro,

More information

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer. DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Accelerating 3D convolution using streaming architectures on FPGAs

Accelerating 3D convolution using streaming architectures on FPGAs Accelerting 3D convolution using streming rchitectures on FPGAs Hohun Fu, Robert G. Clpp, Oskr Mencer, nd Oliver Pell ABSTRACT We investigte FPGA rchitectures for ccelerting pplictions whose dominnt cost

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information

Fault injection attacks on cryptographic devices and countermeasures Part 2

Fault injection attacks on cryptographic devices and countermeasures Part 2 Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect

More information

Address/Data Control. Port latch. Multiplexer

Address/Data Control. Port latch. Multiplexer 4.1 I/O PORT OPERATION As discussed in chpter 1, ll four ports of the 8051 re bi-directionl. Ech port consists of ltch (Specil Function Registers P0, P1, P2, nd P3), n output driver, nd n input buffer.

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

Better Hill-Climbing Searches for Parsimony

Better Hill-Climbing Searches for Parsimony Better Hill-Climbing Serches for Prsimony Gneshkumr Gnpthy, Vijy Rmchndrn, nd Tndy Wrnow Deprtment of Computer Sciences, University of Texs, Austin, TX 78712; gsgk, vlr, tndy @cs.utexs.edu Abstrct. The

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Applied Databases. Sebastian Maneth. Lecture 13 Online Pattern Matching on Strings. University of Edinburgh - February 29th, 2016

Applied Databases. Sebastian Maneth. Lecture 13 Online Pattern Matching on Strings. University of Edinburgh - February 29th, 2016 Applied Dtses Lecture 13 Online Pttern Mtching on Strings Sestin Mneth University of Edinurgh - Ferury 29th, 2016 2 Outline 1. Nive Method 2. Automton Method 3. Knuth-Morris-Prtt Algorithm 4. Boyer-Moore

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Computer-Aided Multiscale Modelling for Chemical Process Engineering

Computer-Aided Multiscale Modelling for Chemical Process Engineering 17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

A dynamic multicast tree based routing scheme without replication in delay tolerant networks

A dynamic multicast tree based routing scheme without replication in delay tolerant networks Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel

More information

Article Data Dissemination in Mobile Social Networks With the Acknowledgment Feedback

Article Data Dissemination in Mobile Social Networks With the Acknowledgment Feedback Article Dt Dissemintion in Mobile Socil Networks With the Acknowledgment Feedbck Ning Wng 1 nd Jie Wu 1 Received: dte ; Accepted: dte ; Published: dte Acdemic Editor: nme 1 Deprtment of Computer nd Informtion

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

The Search for Optimality in Automated Intrusion Response

The Search for Optimality in Automated Intrusion Response The Serch for Optimlity in Automted Intrusion Response Yu-Sung Wu nd Surbh Bgchi (DCSL) & The Center for Eduction nd Reserch in Informtion Assurnce nd Security (CERIAS) School of Electricl nd Computer

More information

COMMON HALF YEARLY EXAMINATION DECEMBER 2018

COMMON HALF YEARLY EXAMINATION DECEMBER 2018 li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Improved Fast Replanning for Robot Navigation in Unknown Terrain

Improved Fast Replanning for Robot Navigation in Unknown Terrain Improved Fst Replnning for Robot Nvigtion in Unknown Terrin ollege of omputing Georgi Institute of Technology tlnt, G 0-00 GIT-OGSI-00/ Sven Koenig ollege of omputing Georgi Institute of Technology tlnt,

More information