Load Balancing in Individual-Based Spatial Applications.

Size: px
Start display at page:

Download "Load Balancing in Individual-Based Spatial Applications."

Transcription

1 Load Balancing in Individual-Based Spatial Applications Fehmina Merchant, Lubomir F. Bic, and Michael B. Dillencourt Department of Information and Computer Science University of California, Irvine Abstract Individual-based spatial simulations are a class of applications in which a collection of entities interact locally with one another within a simulated space to generate some global collective behavior. An Eulerian implementation of such a system partitions the simulated space and assigns each partition, together with the corresponding entities, to a dierent physical node. Load balancing is achieved by dynamically adjusting the decomposition of the simulated space, which forces the corresponding autonomous entities to automatically migrate among physical nodes. This paper presents three load balancing algorithms suitable for such applications. Their primary advantages are (1) full integration into the application, which permits load balancing to be performed without suspending the application and without any additional messages, and (2) use of only near-neighbor communication, which facilitates scalability. Keywords: Dynamic Load Balancing; Domain Decomposition; Individual-Based Simulation; Mobile Objects; Distributed Computing. 1 Introduction Individual-based simulations are a class of applications in which a collection of entities (particles) interact with one another within a two or three-dimensional simulated space. Each entity in such a system has only a very limited local knowledge of the \problem" and has a set of simple rules to follow. A global collective behavior emerges from the interactions among individual entities. Typical examples of such applications are interactive battle simulations, particle-level simulations in physics, trac modeling, evolution and behavior modeling in biology/ecology, articial life, and advanced graphics and animation. For complex individual-based systems, the necessary performance can only be achieved by using multiple machines. This is especially true if the model is to be animated in real time giving the user the opportunity to change the model's behavior interactively. Individual-based systems can be implemented in a distributed fashion by making each node responsible for a xed portion of the problem domain. This xed portion can be assigned using either the Lagrangian method or the Eulerian method [3, 6]. In the Lagrangian method, each node is responsible for a xed set of entities. Since entities usually move in the simulated space by coordinating with their neighboring entities, this approach requires that each node keeps a snapshot of the complete simulated space and updates it throughout the simulation. It also requires that each node must communicate with all other nodes in order to detect potential proximity of entities in the simulated space. Hence this approach is not at all scalable. A conventional dynamic load balancing algorithm may be applied to correct the load imbalance, which can arise as entities perform dierent tasks or get created or destroyed during the simulation. The second approach, using the Eulerian method, assigns to each node a portion of the simulated space, together with the set of entities currently residing in that area. Unlike the Lagrangian method, this approach is scalable since each node only requires a snapshot of its neighboring nodes' simulated space. It also requires only near-neighbor communication for the purpose of proximity detection. However, since entities migrate among nodes, a load imbalance is much more likely to occur, even if all entities perform the same type and amount of work. To correct the imbalance, a load balancing algorithm must periodically re-distributes the simulated space among the nodes, together with the entities residing in the various partitions [1, 3, 6, 7, 2, 9]. In this paper we focus on the Eulerian approach due to its scalability. We used the Messengers en-

2 vironment [5, 4], which is based on the principles of autonomous self-migrating threads, called Messengers. This paradigm is very suitable for individualbased simulations, since each entity can directly be implemented as a separate Messenger, which navigates through the underlying network and interacts with other such Messengers in its proximity. We have implemented three dierent algorithms for spatial load balancing and have investigated their effect on performance. The algorithms were incorporated into a test application, which simulates the behavior of a school of sh in a simulated 2-dimensional body of water [8]. The simulated environment is partitioned using either a 1-dimensional grid (i.e., into strips) or a 2-dimensional grid (i.e., into rectangles). The individual cells are distributed over the network of computing nodes. The simulated entities (sh) are then implemented as individual Messengers, which move in the simulated environment by periodically recomputing their respective positions. The new position of each sh is based on the proximity and the vector of motion of other sh with a certain radius of visibility. When the new position of an entity is outside of the current node's environment, the entity automatically migrates to the appropriate neighboring node. Dynamic load balancing is then performed in an elegant way by moving the partitioning boundaries, which automatically forces the entities to migrate. The three load-balancing algorithms described in this paper all share the following key characteristics. 1. No centralized information. All load balancing decision are made strictly based on information exchanged among nodes sharing a logical boundary. In a 1-dimensional decomposition, each node needs to communicate with two neighbors while in a 2- dimensional decomposition it needs to communicate with eight neighbors. These numbers remain constant regardless of the size of the problem and the number of computers involved. 2. No additional messages. The load balancing algorithms introduce no new messages. All load balancing information is exchanged as part of the normal periodic information exchange among nodes, i.e., it is \piggy-backed" on messages used to migrate entities and exchange boundary information. 3. Preservation of topology. The load balancing algorithms preserve the topology of the decomposition (grid). Thus the size and shape of a grid cell may change, but it retains the same neighbors at all times. 2 Framework for Spatial Load Balancing We have developed a framework for dynamic load balancing for individual-based spatial systems. This consists of the following eight phases: 1. Exchange load information: Each node determines its load value, which is equal to the number of entities in the simulated space of the node, and sends this information to its neighboring nodes. These load values are then used to detect load imbalances and to make simulated space adjustments. 2. Determine local simulated space adjustment: Based on the load information gathered about the neighboring nodes, the imbalance factor is estimated and weighed against the load balancing overhead to determine the protability of load balancing. If it is advantageous to try to correct the load imbalance, the desired local simulated space adjustment is determined. 3. Poll neighbors for simulation space adjustment approval: If a node decides to make local space adjustments, it polls the neighbors whose local space would be aected for approval. A consensus among all the aected nodes needs to be established for consistent global space adjustments. 4. Determine neighbors whose space adjustment requests are acceptable: Each node that has been polled by any of its neighbors decides if the requested space adjustment is acceptable. 5. Exchange replies from previous poll regarding space adjustment requests: Each polled node responds regarding acceptable space adjustments. The replies from all polled nodes are gathered by the corresponding polling nodes. 6. Decide if space adjustment is to be made: Each node decides if space adjustment can be made by examining the responses received from its neighbors. It decides to make an adjustment if responses from all neighbors were armative. 7. Disseminate space adjustments: The results of the previous step are disseminated to all the nodes that might be aected by a local space adjustment. (For load balancing algorithms that require establishing consensus with near-neighbors only, this phase is not needed.) 8. Update local space: Each node updates its local simulated space to correct the load imbalance.

3 PHASES Dynamic Strips Dynamic Rectangles Dynamic Quadrilaterals D D = diameter of the logical network Table 1. Phases of Load Balancing Schemes 3 Dynamic Load Balancing Schemes We have developed three load balancing schemes for individual-based systems using the above framework. Table 1 captures the essence of each algorithm by showing the phases it consists of. Phases 1, 3, 5, and 7 require information to be exchanged among neighbors while phases 2, 4, 6, and 8 are purely computational. The necessary information exchange is \piggy-backed" on the normal messages exchanged among neighboring nodes as part of the application. The number in each entry of Table 1 gives the number of communication exchanges required for the phase. That is, phases 2, 4, 6, and 8 require zero communication exchanges. Phases 1, 3, and 5 each require one exchange. Phase 7 does not exist for dynamic strips (shown as a dash); for dynamic rectangles, it requires D exchanges to propagate the information along a row or column, where D is the diameter of the grid; and for dynamic quadrilaterals it requires two exchanges. 3.1 Dynamic Strips The 2-dimensional simulated space is initially decomposed into N strips as shown in Figure 1. Each strip is mapped onto a single workstation. Load balancing is then achieved by the overloaded nodes (senders) \pulling" the boundaries that they share with their underloaded neighbors (receivers) inward. In other words, each sender node tries to shrink its strip causing the neighboring receiver node strip to become larger, thereby forcing some of its entities to automatically hop to the receiver node. The algorithm starts with each node informing its two neighbors of its load level (phase 1). If the node is overloaded, it randomly selects one of its neighbors n1 n2 n3 n4 Figure 1. Dynamic Strips and determines how protable it will be to move the selected boundary. If this is not protable, it tries the other neighbor and determines if this would be profitable (phase 2). Load balancing protability is determined by calculating the average load of the sender and receiver nodes. If the sender node's load exceeds the average by a prespecied amount, it determines how much to move the boundary inward and then proceeds with the third phase of the load balancing process. In this phase, the sender node queries the receiver if it is okay for it to move the boundary they share with each other (phase 3). The receiver node decides on which (if any) request to accept (phase 4) and replies to the corresponding neighbor (phase 5). The decision is based on whether it has itself polled one of its neighbors (in which case it denies the request) or if it has been polled by both neighbors (in which case it selects one at random). Finally, each sender node that has received a positive response pulls its boundary inward thereby forcing some of its entities to hop to the neigh-

4 n11 n12 n13 n14 n21 n22 n23 n24 n31 n32 n33 n34 n41 n42 n43 n44 Figure 2. Dynamic Rectangles boring receiver node (phase 8). Figure 1 illustrates the scheme. The simulated space is divided into four strips n1, n2, n3 and n4. Assuming node n2 is overloaded and n1 and n3 are less loaded, then n2 selects one of them, say n1, at random. It polls n1 regarding moving the northern boundary that it shares with it to move inward. If node n1 agrees, both n1 and n2 update the boundary thereby correcting the imbalance. 3.2 Dynamic Rectangles The 2-dimensional simulated space is initially decomposed into N rectangles. Each rectangle is mapped onto a single workstation. The simulated space can be thought of in terms of 1-dimensional horizontal and vertical strips. Load is then balanced by nodes, belonging to a particular horizontal or vertical strip, pulling the same local boundaries inward by a certain amount. This is done in unison to preserve the topology of the logical network used by the simulation. The scheme starts with each node informing its eight neighbors of their load level (phase 1). Phases 2-5 are the same as in the case of dynamic strips since nodes in a row or column are trying to adjust horizontal or vertical strips. Assuming that vertical strips are being adjusted, each node selects either its eastern or western boundary that it shares with the lighter neighbor and determines how protable it will be to move the selected boundary (phase 2). In case of adjusting the horizontal strips, each overloaded node will either select its northern or southern boundary to be moved inward. The load balancing protability is determined by calculating the average load of the sender and receiver nodes. If the sender node's load exceeds the average by a prespecied amount, it determines how much to move the boundary by and proceeds with the third phase of the load balancing process. In this phase, the sender node queries the receiver if it is okay for it to move the boundary they share with each other by a certain amount (phase 3). The receiver node determines which (if any) request to accept (phase 4) and replies to the corresponding neighbor (phase 5). At this point, all the nodes along a particular column know if they are allowed to move their eastern or western boundaries. Each node along a column then propagates this information to the rest of the nodes in the same column (phase 7). This is accomplished by each node sending the information to its northern and southern neighbors. The northern and southern neighbors, in turn, passing it on to their immediate north and south neighbors and so on until the information ows to all the nodes in a particular column. After all the nodes in a particular column are made aware of each other's wish to move their eastern or western boundaries, each node determines by how much to move its boundary using the following rule: if at least half of the total number of nodes in a column wish to move their eastern boundaries inward, then each node in a column decides to move its eastern boundary by the average of the total eastern inward move requested by the rest of the nodes in a column. The nodes in each column then update their eastern and western boundaries in unison thereby adjusting the vertical strips (phase 8). An analogous rule is used for the western boundaries and the algorithm keeps alternating between adjusting vertical and horizontal strips. Figure 2 illustrates the dynamic rectangles scheme graphically. The simulated space is divided into 16 rectangles (four horizontal strips and four vertical strips). All nodes rst inform their neighbors of their load level. Assuming that nodes n12, n22, n31 and n42 are overloaded, each selects an eastern or western boundary that it shares with its lighter neighbor to move. Assume further that nodes n12, n22, and n42 selected their western boundaries and node n31 selected its eastern boundary to move inward. Nodes n12, n22, n42, and n31 then ask their neighbors n11, n21, n41, and n32 if it is okay for them to move the boundaries they share with each other. If all the receivers send positive replies, each node makes the rest of the nodes sharing its column aware of the result it has received from its underloaded neighbor. This is done by each node propagating its information in the northern and southern direction to the rest of the nodes in its column. Since at least half of the nodes in column two (n12, n22, and n42) want to move their western bound-

5 n11 n12 n13 n14 n21 n22 n23 n24 n31 n32 n33 n34 n41 n42 n43 n44 Figure 3. Dynamic Quadrilaterals aries inward, all nodes in columns 1 and 2 will do so by the average amounts requested by the nodes n12, n22, and n42, thereby correcting the imbalance while preserving the topology of the logical network. 3.3 Dynamic Quadrilaterals The 2-dimensional simulated space is initially decomposed into N rectangles. Each rectangle is mapped onto a single workstation as in the case of the dynamic rectangles algorithm. Load is then balanced by nodes \pulling" their vertices inward as long as all the affected quadrilaterals stay convex. The topology of the logical network is preserved as in the case of dynamic rectangles. When the scheme starts, it is assumed that every node, in addition to the shape of its simulated space, knows about all its neighbors' shapes. This information is needed to preserve the convexity of all the quadrilaterals. The algorithm begins by each node informing its eight neighbors of their load level (phase 1). Each node chooses a vertex to move that it shares with a diagonally underloaded node. For each vertex, the node with the largest load becomes the sender. If two or three nodes have the same (high) load then the one with the lightest diagonally opposite node is chosen. The load balancing protability is determined by calculating the average load of all four nodes incident on the same vertex. If the sender node's load exceeds the average by a prespecied amount, it calculates how much to move the vertex inward along a vector bisecting the angle formed by its two boundaries incident on the vertex (phase 2). The sender node queries the other three nodes incident on the vertex if it is okay for it to move it (phase 3). Every node that received at least one inquiry or has itself sent inquiries to its neighbors will select either itself or one of its polling neighbors at random to be the sender (that is, the node that pulls the vertex inward) (phase 5). At this point, each sender node knows if it is okay for it to move a vertex and it makes the decision on whether to move it (phase 6). A node can move its vertex only if all three of its neighboring nodes that share the vertex agree with the move. The sender node now propagates the position of its new vertex to all the nodes that will be aected by it (phase 7). The sender rst sends the position of the new vertex to its three neighboring nodes that are incident on it. Then, the three nodes incident on the new vertex propagate it to their neighboring nodes that are diagonally opposite from the new vertex. Finally, all aected nodes update their vertices and the imbalance is corrected (phase 8). Figure 3 illustrates the dynamic quadrilaterals scheme graphically. The simulated space is again divided into 16 rectangles. All the nodes rst inform their neighbors of their load level. Assume that nodes n23 and node n34 are overloaded and their diagonally opposite neighbors n32 and n43 are underloaded and that it is protable to move the vertices they share. Then, node n23 asks its neighbors n22, n32, and n33 if it is okay for them to move the vertex they all share. Similarly, n34 asks the nodes n33, n43 and n44 about their shared vertex. Nodes n22, n32, n43, and n44 reply positively as each of them has received only one request for a vertex movement. Assuming that node n33 replies positively to node n23 and denies node n34's request to move the vertex (using the rule to choose one of the nodes randomly), node n23, at this point, knows that it can move its vertex. Node n23 now propagates the new position of this vertex to all the nodes that have this information cached. Node n23 accomplishes this by rst sending the new vertex position to its neighbors n22, n32, and n33, each of which in turn propagate the information to their neighbors that are incident on the vertex diagonally opposite to the new vertex (n21, n11, n12, n13, n14, n24, n34, n44, n43, n42, n41, and n31). Finally, all the nodes update their vertices. 4 Performance Evaluation We have applied the three dynamic load balancing techniques to a generic individual-based simulation running on a cluster of Sun SPARCstations connected by a 10Mbps Ethernet. The simulation was programmed using Messengers [5, 4], an autonomousobjects-based system developed by our research group. The simulation space was a 2-dimensional 128 by 128

6 Static Strips Static Rectangles Dynamic Strips Dynamic Rectangles Dynamic Quadrilaterals 70 Execution Time (min) Number of Workstations Figure 4. Effect of load balancing under highest communication overhead Static Strips Static Rectangles Dynamic Strips Dynamic Rectangles Dynamic Quadrilaterals 9 8 Speedup Computation to Communication Ratio Figure 5. Effect of computation to communication ratio toroidal grid in which 25,000 entities moved as a single school. The school occupied an area of 10% of the total simulated body of water. The reason for choosing 25,000 entities is that we wanted to have as large a problem as possible without incurring the eects of paging. The single most important measure of eectiveness for any load balancing technique is its impact on the

7 Static Strips Static Rectangles Dynamic Strips Dynamic Rectangles Dynamic Quadrilaterals Average Maximum Occupancy Number of Workstations Figure 6. Level of load balance achieved application's total execution time. Figure 4 shows the results for dierent numbers of workstations ranging from one to 25. The curves labeled static strips and dynamic strips represent the 1-dimensional decomposition of the space; the static one is the execution without load balancing while the dynamic one uses the algorithm described in Section 3.1. The other three curves represent a 2-dimensional space decomposition. Static rectangles means no load balancing while dynamic rectangles and dynamic quadrilaterals correspond to the two load balancing methods described in Sections 3.2 and 3.3. We make the following observations. First, dynamic strips is by far the best method. The only exception is the case of four workstations, where dynamic rectangles are best. The latter provides a more favorable space decomposition but has the same message-passing overhead. At the same time, four workstations are too small a conguration to be of much interest. The reason for the favorable outcome of the dynamic strips method over the other two is communication overhead. A 1-dimensional decomposition requires signicantly fewer messages than a 2-dimensional one, since each grid cell has only two neighbors in one dimension versus eight in two dimensions. This is further supported by the observation that all methods except the dynamic strips improve execution time for up to 16 workstations but yield worse overall performance when 25 workstations are used. This deterioration is not due to the load balancing overhead, which does not introduce any additional message in any of the cases. Rather, the deterioration is due to the application itself the computation performed by each sh is simply too small compared to the necessary message communications to be able to utilize 25 workstations. To study this further, we have held the number of workstation constant at 25 and have increased the computation-to-communication ratio. That is, the length of the computation between any two moves (position adjustments) was increased by articially repeating it multiple times. Figure 5 shows the results. The x-axis represents the computation-to-communication ratio expressed as multiples of the minimal (base) execution time of Figure 4. That is, a 1 on the x-axis represents the same computation-to-communication ratio as that of Figure 4; a 2 means the computation was twice as long, and so on, all the way to 50. We make the following observations. For a small computation to communication ratio, the dynamic strips method continues to perform best. When a critical threshold is passed, both of the 2-dimensional decomposition methods surpass the 1-dimensional one. Of these, the dynamic quadrilateral method performs signicantly better than all the others. The reason is that it has much more exibility to adjust the grid than the other methods (the cells do not have to remain

8 rectangular) and thus achieves the very best load balance. This is shown in Figure 6, which plots the average maximum occupancy, that is, the maximum number of entities in any grid cell averaged over the length of the experiment. The lower the number, the better the load distribution. This is an important measure since all nodes always need to wait for the slowest one the one with the largest number of entities to process. The dynamic quadrilaterals algorithm achieves a consistently better load balance than all the other schemes. It achieves this at the expense of a more complex computation than the other methods. However, the more accurate balance, combined with the fact that it needs fewer communication phases than the dynamic rectangles methods, make it a clear winner for large problems as long as the computation-to-communication ratio is suciently large. 5 Concluding Remarks We have proposed a framework for dynamic load balancing in individual-based spatial systems and presented three specic algorithms based on this framework: (1) dynamic strips (2) dynamic rectangles and (3) dynamic quadrilaterals. The algorithms are based on known concepts and principles but their implementation in the context of individual-based spatial applications is new. Specically, all three algorithms have been designed to satisfy the following constraints: 1. The algorithms work in a fully integrated fashion with the application. Therefore, load balancing is performed without suspending the application and without introducing any additional messages; 2. The algorithms involve only near-neighbor communication, which makes them arbitrarily scalable. Due to these features, load balancing incurs very little overhead. We applied the three dynamic load balancing schemes to a generic individual-based simulation and studied its eect on performance. Our experiments show that all three algorithms are eective in improving overall performance. For simple problems and those involving a low computation-to-communication ratio, a one-dimensional space decomposition with the corresponding dynamic strips algorithm is best. For more complex problems, which are able to mask the communication overhead with adequate amounts of computation, the dynamic quadrilaterals algorithm achieves the best load balance and results in the best overall performance of the application. Additional performance results and other details may be found in [10] and on our Web page: References [1] S. Baden. Run-Time Partitioning of Scientic Continuum Calculations Running on Multiprocessors. Dissertation, U. of California, Berkeley, [2] T.W. Clark, R.v. Hanxleden, J.A. McCammon, and L.R. Scott. Parallelizing molecular dynamics using spatial decomposition. Proceedings of the IEEE Scalable High-Performance Computing Conference, pages 95{102, [3] G.C. Fox. Domain decomposition in distributed and shared memory environments. In Proc. 1st Conf. Supercomputing, Lecture Notes in Computer Sci. 287, [4] M. Fukuda, L.F. Bic, M. Dillencourt, and F. Merchant. Distributed coordination with messengers. Science of Computer Programming, 31(2), Special Issue on Coordination Models, Languages, Applications. [5] M. Fukuda, L.F. Bic, and M.B. Dillencourt. Messages versus messengers in distributed programming. In Proc. Int'l Conf. on Distributed Computing Systems (ICDCS-97), Baltimore, MD, May [6] R.V. Hanxleden and L.R. Scott. Load balancing on message passing architectures. Journal of Parallel and Distributed Computing, 13:312{324, [7] D.Y. Hinz. A run-time load balancing strategy for highly parallel systems. Acta Informatica, 29:63{ 94, [8] A. Huth and C. Wissel. The simulation of the movement of sh schools. Journal of Theoretical Biology, 156:365{385, [9] H. Lorek and M. Sonnenschein. Using parallel computers to simulate individual-oriented models in ecology: A case study. In Proceedings of the 1995 European Simulation Multiconference (ESM), pages 526{531, June [10] Fehmina Merchant. Load Balancing in Spatial Individual-based Systems using Autonomous Objects. PhD thesis, Dept. of Information and Computer Science, University of California, Irvine, Irvine, CA, 1998.

Distributed Individual-Based Simulation

Distributed Individual-Based Simulation Distributed Individual-Based Simulation Jiming Liu, Michael B. Dillencourt, Lubomir F. Bic, Daniel Gillen, and Arthur D. Lander University of California Irvine, CA 92697 bic@ics.uci.edu http://www.ics.uci.edu/

More information

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for Comparison of Two Image-Space Subdivision Algorithms for Direct Volume Rendering on Distributed-Memory Multicomputers Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc Dept. of Computer Eng. and

More information

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Seminar on A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Mohammad Iftakher Uddin & Mohammad Mahfuzur Rahman Matrikel Nr: 9003357 Matrikel Nr : 9003358 Masters of

More information

Fault-Tolerant Routing Algorithm in Meshes with Solid Faults

Fault-Tolerant Routing Algorithm in Meshes with Solid Faults Fault-Tolerant Routing Algorithm in Meshes with Solid Faults Jong-Hoon Youn Bella Bose Seungjin Park Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science Oregon State University

More information

6. Parallel Volume Rendering Algorithms

6. Parallel Volume Rendering Algorithms 6. Parallel Volume Algorithms This chapter introduces a taxonomy of parallel volume rendering algorithms. In the thesis statement we claim that parallel algorithms may be described by "... how the tasks

More information

Data Partitioning. Figure 1-31: Communication Topologies. Regular Partitions

Data Partitioning. Figure 1-31: Communication Topologies. Regular Partitions Data In single-program multiple-data (SPMD) parallel programs, global data is partitioned, with a portion of the data assigned to each processing node. Issues relevant to choosing a partitioning strategy

More information

CONSTRUCTION OF THE VORONOI DIAGRAM BY A TEAM OF COOPERATIVE ROBOTS

CONSTRUCTION OF THE VORONOI DIAGRAM BY A TEAM OF COOPERATIVE ROBOTS CONSTRUCTION OF THE VORONOI DIAGRAM BY A TEAM OF COOPERATIVE ROBOTS Flavio S. Mendes, Júlio S. Aude, Paulo C. V. Pinto IM and NCE, Federal University of Rio de Janeiro P.O.Box 2324 - Rio de Janeiro - RJ

More information

(Preliminary Version 2 ) Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science. Texas A&M University. College Station, TX

(Preliminary Version 2 ) Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science. Texas A&M University. College Station, TX Towards an Adaptive Distributed Shared Memory (Preliminary Version ) Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3 E-mail: fjhkim,vaidyag@cs.tamu.edu

More information

Mobile host protocols support host

Mobile host protocols support host INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2000; 10:191 214 Location update and routing scheme for a mobile computing environment By Anna Hać Ł and Yujing Huang We present a new hierarchical

More information

Relative Reduced Hops

Relative Reduced Hops GreedyDual-Size: A Cost-Aware WWW Proxy Caching Algorithm Pei Cao Sandy Irani y 1 Introduction As the World Wide Web has grown in popularity in recent years, the percentage of network trac due to HTTP

More information

Department of. Computer Science. Remapping Subpartitions of. Hyperspace Using Iterative. Genetic Search. Keith Mathias and Darrell Whitley

Department of. Computer Science. Remapping Subpartitions of. Hyperspace Using Iterative. Genetic Search. Keith Mathias and Darrell Whitley Department of Computer Science Remapping Subpartitions of Hyperspace Using Iterative Genetic Search Keith Mathias and Darrell Whitley Technical Report CS-4-11 January 7, 14 Colorado State University Remapping

More information

Eect of fan-out on the Performance of a. Single-message cancellation scheme. Atul Prakash (Contact Author) Gwo-baw Wu. Seema Jetli

Eect of fan-out on the Performance of a. Single-message cancellation scheme. Atul Prakash (Contact Author) Gwo-baw Wu. Seema Jetli Eect of fan-out on the Performance of a Single-message cancellation scheme Atul Prakash (Contact Author) Gwo-baw Wu Seema Jetli Department of Electrical Engineering and Computer Science University of Michigan,

More information

CAR-TR-990 CS-TR-4526 UMIACS September 2003

CAR-TR-990 CS-TR-4526 UMIACS September 2003 CAR-TR-990 CS-TR-4526 UMIACS 2003-94 September 2003 Object-based and Image-based Object Representations Hanan Samet Computer Science Department Center for Automation Research Institute for Advanced Computer

More information

10.1 Overview. Section 10.1: Overview. Section 10.2: Procedure for Generating Prisms. Section 10.3: Prism Meshing Options

10.1 Overview. Section 10.1: Overview. Section 10.2: Procedure for Generating Prisms. Section 10.3: Prism Meshing Options Chapter 10. Generating Prisms This chapter describes the automatic and manual procedure for creating prisms in TGrid. It also discusses the solution to some common problems that you may face while creating

More information

Network. Department of Statistics. University of California, Berkeley. January, Abstract

Network. Department of Statistics. University of California, Berkeley. January, Abstract Parallelizing CART Using a Workstation Network Phil Spector Leo Breiman Department of Statistics University of California, Berkeley January, 1995 Abstract The CART (Classication and Regression Trees) program,

More information

Dynamic load balancing in OSIRIS

Dynamic load balancing in OSIRIS Dynamic load balancing in OSIRIS R. A. Fonseca 1,2 1 GoLP/IPFN, Instituto Superior Técnico, Lisboa, Portugal 2 DCTI, ISCTE-Instituto Universitário de Lisboa, Portugal Maintaining parallel load balance

More information

SMD149 - Operating Systems - Multiprocessing

SMD149 - Operating Systems - Multiprocessing SMD149 - Operating Systems - Multiprocessing Roland Parviainen December 1, 2005 1 / 55 Overview Introduction Multiprocessor systems Multiprocessor, operating system and memory organizations 2 / 55 Introduction

More information

Overview. SMD149 - Operating Systems - Multiprocessing. Multiprocessing architecture. Introduction SISD. Flynn s taxonomy

Overview. SMD149 - Operating Systems - Multiprocessing. Multiprocessing architecture. Introduction SISD. Flynn s taxonomy Overview SMD149 - Operating Systems - Multiprocessing Roland Parviainen Multiprocessor systems Multiprocessor, operating system and memory organizations December 1, 2005 1/55 2/55 Multiprocessor system

More information

CHAPTER 4 AN INTEGRATED APPROACH OF PERFORMANCE PREDICTION ON NETWORKS OF WORKSTATIONS. Xiaodong Zhang and Yongsheng Song

CHAPTER 4 AN INTEGRATED APPROACH OF PERFORMANCE PREDICTION ON NETWORKS OF WORKSTATIONS. Xiaodong Zhang and Yongsheng Song CHAPTER 4 AN INTEGRATED APPROACH OF PERFORMANCE PREDICTION ON NETWORKS OF WORKSTATIONS Xiaodong Zhang and Yongsheng Song 1. INTRODUCTION Networks of Workstations (NOW) have become important distributed

More information

We consider the problem of rening quadrilateral and hexahedral element meshes. For

We consider the problem of rening quadrilateral and hexahedral element meshes. For Rening quadrilateral and hexahedral element meshes R. Schneiders RWTH Aachen Lehrstuhl fur Angewandte Mathematik, insb. Informatik Ahornstr. 55, 5056 Aachen, F.R. Germany (robert@feanor.informatik.rwth-aachen.de)

More information

Planar Point Location

Planar Point Location C.S. 252 Prof. Roberto Tamassia Computational Geometry Sem. II, 1992 1993 Lecture 04 Date: February 15, 1993 Scribe: John Bazik Planar Point Location 1 Introduction In range searching, a set of values,

More information

TASK FLOW GRAPH MAPPING TO "ABUNDANT" CLIQUE PARALLEL EXECUTION GRAPH CLUSTERING PARALLEL EXECUTION GRAPH MAPPING TO MAPPING HEURISTIC "LIMITED"

TASK FLOW GRAPH MAPPING TO ABUNDANT CLIQUE PARALLEL EXECUTION GRAPH CLUSTERING PARALLEL EXECUTION GRAPH MAPPING TO MAPPING HEURISTIC LIMITED Parallel Processing Letters c World Scientic Publishing Company FUNCTIONAL ALGORITHM SIMULATION OF THE FAST MULTIPOLE METHOD: ARCHITECTURAL IMPLICATIONS MARIOS D. DIKAIAKOS Departments of Astronomy and

More information

Preliminary results from an agent-based adaptation of friendship games

Preliminary results from an agent-based adaptation of friendship games Preliminary results from an agent-based adaptation of friendship games David S. Dixon June 29, 2011 This paper presents agent-based model (ABM) equivalents of friendshipbased games and compares the results

More information

Improving the Performance of Partitioning Methods for Crowd Simulations

Improving the Performance of Partitioning Methods for Crowd Simulations Eighth International Conference on Hybrid Intelligent Systems Improving the Performance of Partitioning Methods for Crowd Simulations G. Vigueras, M. Lozano, J. M. Orduña and F. Grimaldo Departamento de

More information

Context based optimal shape coding

Context based optimal shape coding IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Distributed KIDS Labs 1

Distributed KIDS Labs 1 Distributed Databases @ KIDS Labs 1 Distributed Database System A distributed database system consists of loosely coupled sites that share no physical component Appears to user as a single system Database

More information

Memory Hierarchy Management for Iterative Graph Structures

Memory Hierarchy Management for Iterative Graph Structures Memory Hierarchy Management for Iterative Graph Structures Ibraheem Al-Furaih y Syracuse University Sanjay Ranka University of Florida Abstract The increasing gap in processor and memory speeds has forced

More information

Interconnect Technology and Computational Speed

Interconnect Technology and Computational Speed Interconnect Technology and Computational Speed From Chapter 1 of B. Wilkinson et al., PARAL- LEL PROGRAMMING. Techniques and Applications Using Networked Workstations and Parallel Computers, augmented

More information

Geometry Critical Areas of Focus

Geometry Critical Areas of Focus Ohio s Learning Standards for Mathematics include descriptions of the Conceptual Categories. These descriptions have been used to develop critical areas for each of the courses in both the Traditional

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

GRID BASED CLUSTERING

GRID BASED CLUSTERING Cluster Analysis Grid Based Clustering STING CLIQUE 1 GRID BASED CLUSTERING Uses a grid data structure Quantizes space into a finite number of cells that form a grid structure Several interesting methods

More information

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Saumitra M. Das, Himabindu Pucha and Y. Charlie Hu School of Electrical and Computer Engineering Purdue University West

More information

Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults

Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Seungjin Park Jong-Hoon Youn Bella Bose Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science

More information

Image-Space-Parallel Direct Volume Rendering on a Cluster of PCs

Image-Space-Parallel Direct Volume Rendering on a Cluster of PCs Image-Space-Parallel Direct Volume Rendering on a Cluster of PCs B. Barla Cambazoglu and Cevdet Aykanat Bilkent University, Department of Computer Engineering, 06800, Ankara, Turkey {berkant,aykanat}@cs.bilkent.edu.tr

More information

MA 323 Geometric Modelling Course Notes: Day 36 Subdivision Surfaces

MA 323 Geometric Modelling Course Notes: Day 36 Subdivision Surfaces MA 323 Geometric Modelling Course Notes: Day 36 Subdivision Surfaces David L. Finn Today, we continue our discussion of subdivision surfaces, by first looking in more detail at the midpoint method and

More information

A technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects

A technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects A technique for adding range restrictions to generalized searching problems Prosenjit Gupta Ravi Janardan y Michiel Smid z August 30, 1996 Abstract In a generalized searching problem, a set S of n colored

More information

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems On Object Orientation as a Paradigm for General Purpose Distributed Operating Systems Vinny Cahill, Sean Baker, Brendan Tangney, Chris Horn and Neville Harris Distributed Systems Group, Dept. of Computer

More information

Geometry I Can Statements I can describe the undefined terms: point, line, and distance along a line in a plane I can describe the undefined terms:

Geometry I Can Statements I can describe the undefined terms: point, line, and distance along a line in a plane I can describe the undefined terms: Geometry I Can Statements I can describe the undefined terms: point, line, and distance along a line in a plane I can describe the undefined terms: point, line, and distance along a line in a plane I can

More information

GEOMETRY. Changes to the original 2010 COS is in red. If it is red and crossed out, it has been moved to another course.

GEOMETRY. Changes to the original 2010 COS is in red. If it is red and crossed out, it has been moved to another course. The Geometry course builds on Algebra I concepts and increases students knowledge of shapes and their properties through geometry-based applications, many of which are observable in aspects of everyday

More information

A Framework for A Graph- and Queuing System-Based Pedestrian Simulation

A Framework for A Graph- and Queuing System-Based Pedestrian Simulation A Framework for A Graph- and Queuing System-Based Pedestrian Simulation Srihari Narasimhan IPVS Universität Stuttgart Stuttgart, Germany Hans-Joachim Bungartz Institut für Informatik Technische Universität

More information

Advanced Numerical Methods for Numerical Weather Prediction

Advanced Numerical Methods for Numerical Weather Prediction Advanced Numerical Methods for Numerical Weather Prediction Francis X. Giraldo Naval Research Laboratory Monterey, CA 93943-5502 phone: (831) 656-4882 fax: (831) 656-4769 e-mail: giraldo@nrlmry.navy.mil

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Using Geometric Constraints to Capture. design intent

Using Geometric Constraints to Capture. design intent Journal for Geometry and Graphics Volume 3 (1999), No. 1, 39 45 Using Geometric Constraints to Capture Design Intent Holly K. Ault Mechanical Engineering Department, Worcester Polytechnic Institute 100

More information

Ohio s Learning Standards Mathematics Scope and Sequence YEC Geometry

Ohio s Learning Standards Mathematics Scope and Sequence YEC Geometry Youngstown City School District English Language Arts Scope and Sequence Grade K Ohio s Learning Standards Mathematics Scope and Sequence YEC Geometry Mathematics Standards Scope and Sequence, YEC Geometry

More information

Chapter 6 Memory 11/3/2015. Chapter 6 Objectives. 6.2 Types of Memory. 6.1 Introduction

Chapter 6 Memory 11/3/2015. Chapter 6 Objectives. 6.2 Types of Memory. 6.1 Introduction Chapter 6 Objectives Chapter 6 Memory Master the concepts of hierarchical memory organization. Understand how each level of memory contributes to system performance, and how the performance is measured.

More information

Java Virtual Machine

Java Virtual Machine Evaluation of Java Thread Performance on Two Dierent Multithreaded Kernels Yan Gu B. S. Lee Wentong Cai School of Applied Science Nanyang Technological University Singapore 639798 guyan@cais.ntu.edu.sg,

More information

task object task queue

task object task queue Optimizations for Parallel Computing Using Data Access Information Martin C. Rinard Department of Computer Science University of California, Santa Barbara Santa Barbara, California 9316 martin@cs.ucsb.edu

More information

Lecture 12: Grids Steven Skiena. skiena

Lecture 12: Grids Steven Skiena.   skiena Lecture 12: Grids Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Rectilinear Grids Rectilinear grids are typically

More information

Using Semi-Regular 4 8 Meshes for Subdivision Surfaces

Using Semi-Regular 4 8 Meshes for Subdivision Surfaces Using Semi-Regular 8 Meshes for Subdivision Surfaces Luiz Velho IMPA Instituto de Matemática Pura e Aplicada Abstract. Semi-regular 8 meshes are refinable triangulated quadrangulations. They provide a

More information

Image Segmentation Techniques for Object-Based Coding

Image Segmentation Techniques for Object-Based Coding Image Techniques for Object-Based Coding Junaid Ahmed, Joseph Bosworth, and Scott T. Acton The Oklahoma Imaging Laboratory School of Electrical and Computer Engineering Oklahoma State University {ajunaid,bosworj,sacton}@okstate.edu

More information

n = 2 n = 1 µ λ n = 0

n = 2 n = 1 µ λ n = 0 A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University Abstract We consider wavelength

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Critical Area Computation for Missing Material Defects in VLSI Circuits

Critical Area Computation for Missing Material Defects in VLSI Circuits IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 5, MAY 2001 583 Critical Area Computation for Missing Material Defects in VLSI Circuits Evanthia Papadopoulou

More information

Enabling Contiguous Node Scheduling on the Cray XT3

Enabling Contiguous Node Scheduling on the Cray XT3 Enabling Contiguous Node Scheduling on the Cray XT3 Chad Vizino vizino@psc.edu Pittsburgh Supercomputing Center ABSTRACT: The Pittsburgh Supercomputing Center has enabled contiguous node scheduling to

More information

Map Abstraction with Adjustable Time Bounds

Map Abstraction with Adjustable Time Bounds Map Abstraction with Adjustable Time Bounds Sourodeep Bhattacharjee and Scott D. Goodwin School of Computer Science, University of Windsor Windsor, N9B 3P4, Canada sourodeepbhattacharjee@gmail.com, sgoodwin@uwindsor.ca

More information

A PARALLEL ALGORITHM FOR THE DEFORMATION AND INTERACTION OF STRUCTURES MODELED WITH LAGRANGE MESHES IN AUTODYN-3D

A PARALLEL ALGORITHM FOR THE DEFORMATION AND INTERACTION OF STRUCTURES MODELED WITH LAGRANGE MESHES IN AUTODYN-3D 3 rd International Symposium on Impact Engineering 98, 7-9 December 1998, Singapore A PARALLEL ALGORITHM FOR THE DEFORMATION AND INTERACTION OF STRUCTURES MODELED WITH LAGRANGE MESHES IN AUTODYN-3D M.

More information

Performance Comparison Between AAL1, AAL2 and AAL5

Performance Comparison Between AAL1, AAL2 and AAL5 The University of Kansas Technical Report Performance Comparison Between AAL1, AAL2 and AAL5 Raghushankar R. Vatte and David W. Petr ITTC-FY1998-TR-13110-03 March 1998 Project Sponsor: Sprint Corporation

More information

Topological Issues in Hexahedral Meshing

Topological Issues in Hexahedral Meshing Topological Issues in Hexahedral Meshing David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science Outline I. What is meshing? Problem statement Types of mesh Quality issues

More information

TECHNICAL RESEARCH REPORT

TECHNICAL RESEARCH REPORT TECHNICAL RESEARCH REPORT A Scalable Extension of Group Key Management Protocol by R. Poovendran, S. Ahmed, S. Corson, J. Baras CSHCN T.R. 98-5 (ISR T.R. 98-14) The Center for Satellite and Hybrid Communication

More information

Mathematics Curriculum

Mathematics Curriculum 6 G R A D E Mathematics Curriculum GRADE 6 5 Table of Contents 1... 1 Topic A: Area of Triangles, Quadrilaterals, and Polygons (6.G.A.1)... 11 Lesson 1: The Area of Parallelograms Through Rectangle Facts...

More information

Comparing Gang Scheduling with Dynamic Space Sharing on Symmetric Multiprocessors Using Automatic Self-Allocating Threads (ASAT)

Comparing Gang Scheduling with Dynamic Space Sharing on Symmetric Multiprocessors Using Automatic Self-Allocating Threads (ASAT) Comparing Scheduling with Dynamic Space Sharing on Symmetric Multiprocessors Using Automatic Self-Allocating Threads (ASAT) Abstract Charles Severance Michigan State University East Lansing, Michigan,

More information

Using the Holey Brick Tree for Spatial Data. in General Purpose DBMSs. Northeastern University

Using the Holey Brick Tree for Spatial Data. in General Purpose DBMSs. Northeastern University Using the Holey Brick Tree for Spatial Data in General Purpose DBMSs Georgios Evangelidis Betty Salzberg College of Computer Science Northeastern University Boston, MA 02115-5096 1 Introduction There is

More information

Research on outlier intrusion detection technologybased on data mining

Research on outlier intrusion detection technologybased on data mining Acta Technica 62 (2017), No. 4A, 635640 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on outlier intrusion detection technologybased on data mining Liang zhu 1, 2 Abstract. With the rapid development

More information

GEOMETRY CCR MATH STANDARDS

GEOMETRY CCR MATH STANDARDS CONGRUENCE, PROOF, AND CONSTRUCTIONS M.GHS. M.GHS. M.GHS. GEOMETRY CCR MATH STANDARDS Mathematical Habits of Mind. Make sense of problems and persevere in solving them.. Use appropriate tools strategically..

More information

UNDERSTANDING GIGABIT ETHERNET PERFORMANCE

UNDERSTANDING GIGABIT ETHERNET PERFORMANCE 51-20-98 DATA COMMUNICATIONS MANAGEMENT UNDERSTANDING GIGABIT ETHERNET PERFORMANCE Gilbert Held INSIDE Ethernet Frame Flow; The Gigabit Ethernet Frame OVERVIEW Gigabit Ethernet represents the latest Institute

More information

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on Mr. Nirav Bhatt, Dr. Dhaval Kathiriya Reaserch Scholar, School of Computer Science, RK University, Rajkot Director IT,

More information

Cluster quality 15. Running time 0.7. Distance between estimated and true means Running time [s]

Cluster quality 15. Running time 0.7. Distance between estimated and true means Running time [s] Fast, single-pass K-means algorithms Fredrik Farnstrom Computer Science and Engineering Lund Institute of Technology, Sweden arnstrom@ucsd.edu James Lewis Computer Science and Engineering University of

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

YEC Geometry Scope and Sequence Pacing Guide

YEC Geometry Scope and Sequence Pacing Guide YEC Scope and Sequence Pacing Guide Quarter 1st 2nd 3rd 4th Units 1 2 3 4 5 6 7 8 G.CO.1 G.CO.2 G.CO.6 G.CO.9 G.CO.3 G.CO.7 G.CO.10 G.CO.4 G.CO.8 G.CO.11 Congruence G.CO.5 G.CO.12 G.CO.13 Similarity, Right

More information

Texture Mapping using Surface Flattening via Multi-Dimensional Scaling

Texture Mapping using Surface Flattening via Multi-Dimensional Scaling Texture Mapping using Surface Flattening via Multi-Dimensional Scaling Gil Zigelman Ron Kimmel Department of Computer Science, Technion, Haifa 32000, Israel and Nahum Kiryati Department of Electrical Engineering

More information

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.

More information

Topology and Boundary Representation. The ACIS boundary representation (B-rep) of a model is a hierarchical decomposition of the model s topology:

Topology and Boundary Representation. The ACIS boundary representation (B-rep) of a model is a hierarchical decomposition of the model s topology: Chapter 6. Model Topology Topology refers to the spatial relationships between the various entities in a model. Topology describes how geometric entities are connected (connectivity). On its own, topology

More information

GEOMETRY Graded Course of Study

GEOMETRY Graded Course of Study GEOMETRY Graded Course of Study Conceptual Category: Domain: Congruence Experiment with transformations in the plane. Understand congruence in terms of rigid motions. Prove geometric theorems both formally

More information

Texture Segmentation by Windowed Projection

Texture Segmentation by Windowed Projection Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw

More information

Preferred directions for resolving the non-uniqueness of Delaunay triangulations

Preferred directions for resolving the non-uniqueness of Delaunay triangulations Preferred directions for resolving the non-uniqueness of Delaunay triangulations Christopher Dyken and Michael S. Floater Abstract: This note proposes a simple rule to determine a unique triangulation

More information

Cost Models for Query Processing Strategies in the Active Data Repository

Cost Models for Query Processing Strategies in the Active Data Repository Cost Models for Query rocessing Strategies in the Active Data Repository Chialin Chang Institute for Advanced Computer Studies and Department of Computer Science University of Maryland, College ark 272

More information

Online algorithms for clustering problems

Online algorithms for clustering problems University of Szeged Department of Computer Algorithms and Artificial Intelligence Online algorithms for clustering problems Summary of the Ph.D. thesis by Gabriella Divéki Supervisor Dr. Csanád Imreh

More information

Configuring BGP. Cisco s BGP Implementation

Configuring BGP. Cisco s BGP Implementation Configuring BGP This chapter describes how to configure Border Gateway Protocol (BGP). For a complete description of the BGP commands in this chapter, refer to the BGP s chapter of the Network Protocols

More information

Lecture 2: Parallel Programs. Topics: consistency, parallel applications, parallelization process

Lecture 2: Parallel Programs. Topics: consistency, parallel applications, parallelization process Lecture 2: Parallel Programs Topics: consistency, parallel applications, parallelization process 1 Sequential Consistency A multiprocessor is sequentially consistent if the result of the execution is achievable

More information

Peer-to-Peer Systems Exercise Winter Term 2014/2015

Peer-to-Peer Systems Exercise Winter Term 2014/2015 Peer-to-Peer Systems Exercise Published: 3..4 Presentation date: 3..4 Peer-to-Peer Systems Exercise Winter Term 4/5 General Remarks Welcome to the exercise for the lecture Peer-to-Peer Systems. Please

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

160 M. Nadjarbashi, S.M. Fakhraie and A. Kaviani Figure 2. LUTB structure. each block-level track can be arbitrarily connected to each of 16 4-LUT inp

160 M. Nadjarbashi, S.M. Fakhraie and A. Kaviani Figure 2. LUTB structure. each block-level track can be arbitrarily connected to each of 16 4-LUT inp Scientia Iranica, Vol. 11, No. 3, pp 159{164 c Sharif University of Technology, July 2004 On Routing Architecture for Hybrid FPGA M. Nadjarbashi, S.M. Fakhraie 1 and A. Kaviani 2 In this paper, the routing

More information

3.1. Solution for white Gaussian noise

3.1. Solution for white Gaussian noise Low complexity M-hypotheses detection: M vectors case Mohammed Nae and Ahmed H. Tewk Dept. of Electrical Engineering University of Minnesota, Minneapolis, MN 55455 mnae,tewk@ece.umn.edu Abstract Low complexity

More information

An Agent-Based Adaptation of Friendship Games: Observations on Network Topologies

An Agent-Based Adaptation of Friendship Games: Observations on Network Topologies An Agent-Based Adaptation of Friendship Games: Observations on Network Topologies David S. Dixon University of New Mexico, Albuquerque NM 87131, USA Abstract. A friendship game in game theory is a network

More information

Memory Systems IRAM. Principle of IRAM

Memory Systems IRAM. Principle of IRAM Memory Systems 165 other devices of the module will be in the Standby state (which is the primary state of all RDRAM devices) or another state with low-power consumption. The RDRAM devices provide several

More information

Minoru SASAKI and Kenji KITA. Department of Information Science & Intelligent Systems. Faculty of Engineering, Tokushima University

Minoru SASAKI and Kenji KITA. Department of Information Science & Intelligent Systems. Faculty of Engineering, Tokushima University Information Retrieval System Using Concept Projection Based on PDDP algorithm Minoru SASAKI and Kenji KITA Department of Information Science & Intelligent Systems Faculty of Engineering, Tokushima University

More information

Geometry GEOMETRY. Congruence

Geometry GEOMETRY. Congruence Geometry Geometry builds on Algebra I concepts and increases students knowledge of shapes and their properties through geometry-based applications, many of which are observable in aspects of everyday life.

More information

A New Theory of Deadlock-Free Adaptive. Routing in Wormhole Networks. Jose Duato. Abstract

A New Theory of Deadlock-Free Adaptive. Routing in Wormhole Networks. Jose Duato. Abstract A New Theory of Deadlock-Free Adaptive Routing in Wormhole Networks Jose Duato Abstract Second generation multicomputers use wormhole routing, allowing a very low channel set-up time and drastically reducing

More information

Prime Time (Factors and Multiples)

Prime Time (Factors and Multiples) CONFIDENCE LEVEL: Prime Time Knowledge Map for 6 th Grade Math Prime Time (Factors and Multiples). A factor is a whole numbers that is multiplied by another whole number to get a product. (Ex: x 5 = ;

More information

Technical Report. Removing polar rendering artifacts in subdivision surfaces. Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin.

Technical Report. Removing polar rendering artifacts in subdivision surfaces. Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin. Technical Report UCAM-CL-TR-689 ISSN 1476-2986 Number 689 Computer Laboratory Removing polar rendering artifacts in subdivision surfaces Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin June 2007

More information

Geometry Sixth Grade

Geometry Sixth Grade Standard 6-4: The student will demonstrate through the mathematical processes an understanding of shape, location, and movement within a coordinate system; similarity, complementary, and supplementary

More information

IN5050: Programming heterogeneous multi-core processors Thinking Parallel

IN5050: Programming heterogeneous multi-core processors Thinking Parallel IN5050: Programming heterogeneous multi-core processors Thinking Parallel 28/8-2018 Designing and Building Parallel Programs Ian Foster s framework proposal develop intuition as to what constitutes a good

More information

NavP Versus SPMD : Two Views of Distributed Computation

NavP Versus SPMD : Two Views of Distributed Computation NavP Versus SPMD : Two Views of Distributed Lei Pan, Lubomir F. Bic, Michael B. Dillencourt, and Ming Kin Lai School of Information & Computer Science University of California, Irvine Irvine, CA 92697-3425,

More information

A Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique

A Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 A Real Time GIS Approximation Approach for Multiphase

More information

Grade 9, 10 or 11- Geometry

Grade 9, 10 or 11- Geometry Grade 9, 10 or 11- Geometry Strands 1. Congruence, Proof, and Constructions 2. Similarity, Proof, and Trigonometry 3. Extending to Three Dimensions 4. Connecting Algebra and Geometry through Coordinates

More information

Geometry. Given a rectangle, parallelogram, trapezoid, or regular polygon, describe the rotations and reflections that carry it onto itself.

Geometry. Given a rectangle, parallelogram, trapezoid, or regular polygon, describe the rotations and reflections that carry it onto itself. Common Core State for Mathematics High School Following is a correlation of Pearson s Prentice Hall Common Core Geometry 2012 to Common Core State for High School Mathematics. Geometry Congruence G-CO

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Load Balancing in Distributed System through Task Migration

Load Balancing in Distributed System through Task Migration Load Balancing in Distributed System through Task Migration Santosh Kumar Maurya 1 Subharti Institute of Technology & Engineering Meerut India Email- santoshranu@yahoo.com Khaleel Ahmad 2 Assistant Professor

More information