A Distributed First and Last Consistent Global Checkpoint Algorithm
|
|
- Kevin McDaniel
- 5 years ago
- Views:
Transcription
1 A Dstrbuted Frst and Last Consstent Global Cecpont Algortm Yosfum Manabe NTT Basc Researc Laboratores 3-1 Mornosato-Waamya, Atsug-s, Kanagawa Japan Abstract Dstrbuted coordnated cecpontng algortms are dscussed. Te frst global cecpont for a cecpont ntaton s a set contanng te cecpont for eac process n wc any cecpont before te element s not consstent wt te ntaton. Te last global cecpont for a cecpont ntaton s a set contanng te cecpont for eac process n wc any cecpont after te element s not consstent wt te ntaton. Ts paper presents dstrbuted algortms tat mae te frst and last global cecponts consstent wt a mnmum number of cecponts taen n eac process. 1 Introducton Dstrbuted coordnated cecpontng obtans a set of states as a consstent global cecpont [8], n wc no message s recorded as receved n one process and as not yet sent n anoter process. It can be used for process rollbac 1. Wen a process ntates cecpontng, addtonal cecponts must be taen n oter processes n order to obtan a consstent global cecpont tat ncludes te ntaton. Dfferent global cecponts mgt be obtaned dependng on te addtonal cecponts taen by eac process. Ts paper consders two cases and defnes two nds of global cecpont. Te frst case s recovery from falure. Wen process p experences a falure, all processes roll bac to eac state n a consstent global cecpont. Te addtonal rollbac for processes oter tan p must be as small as possble n order to mnmze te overead of reexecuton. Tus, t s better for te oter processes to roll bac to latter cecponts. Te second case s rollbac n debuggng. Assume tat p rolls bac to a state wen an error s observed. Te bug mgt be n process p and a wrong 1 In order to roll bac, te messages wc ave been sent but not receved must be restored. Te message restoraton metod s smlar to tat n [9] and te detals are gven n [6]. Ts paper tus dscusses obtanng a consstent global cecpont. message from p mgt ave caused te error. Tus, te debugger user wants to observe eac process n a consstent global state. If a latter cecpont s used for p s rollbac, te bug mgt be dden by furter executon of p ; for example, extng from a subroutne and deletng all varables tat decded te content of te wrong message [4]. Tus, t s better for te oter processes to roll bac to former cecponts. Ts paper tus defnes two global cecponts: te frst and last global cecponts [5]. Te frst (last) global cecpont for a cecpont ntaton s a set contanng te cecpont for eac process n wc any cecpont before (after) te element s not consstent wt te ntaton. Ts paper ten gves two dstrbuted algortms tat mae te frst and last global cecpont consstent wt te mnmum number of addtonal cecponts taen n eac process. Toug ndependent cecpontng algortms, suc as tat n [9], do not need consstent global cecponts, tey can be used only for systems n wc all non-determnstc events can be recorded durng executon and replayed durng re-executon. For systems n wc records of nondetermnstc events can be very large or replayng nondetermnstc events s dffcult, a consstent global cecpont s necessary. Candy et al. s dstrbuted snapsot algortm [] obtans a consstent global cecpont (neter te frst nor te last) for concurrent ntatons. Te autor [7] extended ter algortm and te extended verson mnmzes te number of addtonal cecponts. Venates et al. s algortm [10] obtans a last global cecpont tat s consstent, and Baldon et al. s algortm [1] obtans a frst global cecpont tat s consstent, but tey dd not defne te concept of frst and last global cecponts. Ter algortms do not mnmze te number of addtonal cecponts. Te frst and last global cecpont Te dstrbuted system s modeled by a fnte set of processes fp 1 ;p ;:::;p n g nterconnected by pont-to-pont cannels. Cannels are assumed to be error-free, non-fifo, and ave nfnte capacty. Te communcaton s asyn-
2 cronous; tat s, te delay experenced by a message s unbounded but fnte. p s executon s a sequence of p s events wc nclude cecpont ntatons. Cecpont ntatons are done ndependently by eac process. System executon E s te set of eac process s executons. p s executon wt cecpontng algortm A s p s executon nterleaved wt te addtonal cecponts taen by A n p. System executon wt A, E(A), s te set of eac process s executon wt A. Te followng assumptons are common for dstrbuted cecpontng algortm A [1][10]. A as no pror nowledge about executon E. All nformaton for A s pggybaced on program messages between processes. Wen p receves a message m, A can get te nformaton pggybaced on m and tae an addtonal cecpont before p executes te receve event. Te appened before(!) relaton between te events n E(A) s defned as follows [3]. Defnton 1 e! e 0 f and only f (1) e and e 0 are executed n te same process and e s not executed after e 0. () e s te send event s(m) and e 0 s te receve event r(m) of te same message m. (3) e! e 00 and e 00! e 0 for event e 00. Wen e and e 0 are executed n dfferent processes and e! e 0, tere s a sequence of events e; s(m 1 );r(m 1 );s(m );:::;s(m );r(m );e 0 n wc e! s(m 1 ), r(m )! s(m +1)( = 1;:::; 0 1), r(m )! e 0, every par of events s executed n te same process, and every s(m ) s executed n a dfferent process. Ts sequence s called a causal sequence from e to e 0. s te lengt of te causal sequence. Two specal events,? and >, are defned for p.? s an magnary event wc s p s ntal state. > s p s current event f p s not termnated. If p s termnated, > s an magnary event wc s p s termnal state. For any p event e,?! e and e!> old. Ts paper consders > and? as cecponts n E. For p s event e n E(A), two events on p, causal-past event, cp e (), and causal-future event, cf e (), are defned as follows. Defnton cp e ()=cf e ()=e. cp e () s last event e n p tat satsfes e! e.if tere s no event e satsfyng e! e, cp e ()=?. cf e () s frst event e n p tat satsfes e! e.if tere s no event e satsfyng e! e, cf e ()=>. Intutvely, cp e () s p s last event wc s nown to p at e. cf e () s p s frst event wc nows e. In Fg. 1, cp c1 (1) =s(m 1 ), cp c1 () =c 1, cpc1 (3) =s(m ), cp c1 (4) =? 4, cf c1 (1) = > 1, cf c1 () = c 1, cf c1 (3) = r(m 5 ), and cf c1 (4)=r(m 6 ). Defnton 3 A par of cecponts (c; c 0 ) s consstent f and only f c 6! c 0 and c 0 6! c. Defnton 4 A global cecpont (c 1 ;c ;:::;c n ) s n-tuple of cecponts were c s p s cecpont. A global cecpont s consstent f and only f all dstnct pars of cecponts are consstent. Defnton 5 Te frst global cecpont for p s cecpont ntaton c n E(A), FG c (E(A)), s defned as follows. -t element, FG c (E(A);), s te frst cecpont n p wc s not before cp c (). E(A) s omtted f t s obvous. Defnton 6 Te last global cecpont for p s cecpont ntaton c n E(A) LG c (E(A)), s defned as follows. -t element, LG c (E(A);), s te last cecpont n p wc s not after cf c (). FG c (E(A);) (or LG c (E(A);)) = > means tat p need not roll bac at all wen p rolls bac to c. Any cecpont of p before cp c () or after cf c () s not consstent wt c c. Tus, FG c (E(A)) and LG c (E(A)) are te best possble former and latter global cecponts for c. In Fg. 1, FG c1 (E) = (c 1 1 ;c1 ;c1 3 ;? 4) and LG c1 (E) = (> 1 ;c 1 ;c1 3 ;c 4). FG c1 (E) s not consstent snce c 1 1! c1 3. LGc1 (E) s not consstent snce c 1 3! c 4. Toug FG c (E) and LG c (E) mgt not be consstent, FG c (E(A)) and LG c (E(A)) can be consstent by te addtonal cecponts taen by A. In Fg. 1, f A taes an addtonal cecpont at e 1, FG c1 (E(A); 3) =e 1 and FG c1 (E(A)) s consstent. If A 0 taes an addtonal cecpont at e, LG c1 (E(A 0 ); 3) =e and LG c1 (E(A 0 )) s consstent. If algortm A 0 taes an addtonal cecpont ust before every receve event, FG c (E(A 0 )) and LG c (E(A 0 )) s consstent for any cecpont ntaton c. However, te overead of A 0 s very large. Ts paper sows two dstrbuted cecpontng algortms, FA and LA. Among algortm A wc maes every FG c (E(A)) (LG c (E(A))) consstent, FA (LA) taes te mnmum number of addtonal cecponts. Our algortms deal wt cecpont ntatons and addtonal cecponts dfferently. If a user wants to deal wt an addtonal cecpont as an ntaton, ts can be done by executng te cecpont ntaton procedure for te addtonal cecpont.
3 3 Algortm FAfor FG c In te rest of te paper, a sequence number s assgned for (bot of ntaton and addtonal) cecponts n eac process n E(A).? s p s 0-t cecpont. Let c x be p s x -t cecpont. It s sometmes denoted as x n subscrpts f t s not ambguous. p mantans a varable c (). c ()=xf p currently nows p s cecpont c x. c () = 01 fp currently nows no cecpont n p.if c ()=x( 0) at event e, c x! e and c ()=x at cp e () s satsfed. c () s p s newest cecpont number. Updatng c can be done by sendng ts current value on every message. Ts s sown n detal n Fg. 4. For any algortm A, FG c (E(A)) for p s cecpont ntaton c can be represented usng c as follows: Let CK() be te value of c () at c. FG c () = c CK()+1 ( 6= ). If te (CK()+1)-t cecpont does not exst n p, FG c () =>. In order to mae t consstent, FA taes addtonal cecponts. Now consder te case wen a message m from p arrves at p. Assume tat p as taen (x 0 1) cecponts before te arrval of m. Te frst case wen te x -t cecpont must be taen before r(m) s sown n Fg.. p nows p s cecpont ntaton c x and cx 01! c x. Snce p nows te ntaton, c x! r(m) s satsfed. If p does not tae te x -t cecpont before r(m), c x! r(m)! cx (= FG x ()) and FG x s not consstent. Ts condton s represented as follows. Consder a varable n (). n () =true f p nows a cecpont ntaton c tat satsfes c x! c for p s current cecpont c x. Te followng s p s rule for tang a cecpont before r(m). (Rule F1) n ()=true. Te update rule of n s sown n Fg. 4. Te second case s sown n Fg. 3. In ts case p mgt ntate a cecpont after e = cp r(m) (). Toug ts cecpont s unnecessary f p actually does not ntate after e, p taes t snce p cannot predct p s executon after e at r(m). Ts case s dvded nto two subcases. Te frst subcase s wen p nows p s current (te (x 0 1)-t) cecpont at e. p ntates cecpont c x ust after e. Assume tat tere s a cecpont c x tat satsfes cx! r(m) and c x 6! e. Snce c x 6! e, FG x from te decson ()! c x rule of FG.Ifp does not tae te x -t cecpont before r(m), FG x ()! c x! r(m)! cx (= FG x ()) and FG x s not consstent. Te second subcase s wen p does not now p s (x 0 1)-t cecpont at e. In order for p to ntate a cecpont tat satsfes FG x ()=x, p must frst receve a message tat carres te nformaton of c x01 and ten ntate. Assume tat tere s a message m 0 sent to p but not receved before e, wc carres te nformaton about c x01. Assume also tat p receves m 0 ust after e and ten ntates a cecpont c x. Furter assume tat tere s a cecpont c x tat satsfes cx! r(m) and cx 6! r(m0 ). Snce c x 6! r(m0 ), FG x ()! c x. If p does not tae te x -t cecpont before r(m), c x! r(m)! cx and FG x s not consstent. Ts condton s represented as follows. Introduce boolean varable cr (; ) and ad (; ; ). cr (; )=true f p nows tat p nows p s current (te c ()-t) cecpont. Note tat cr (; ) s always true for every. ad (; ; )=true f p nows tat p wll now p s current (te c ()-t) cecpont f p receves any message sent to p tat carres p s current (te c ()-t) cecpont. If p already nows p s current cecpont or suc a message does not exst, ad (; ; )=false. (Rule F) (cr (; ) = true and cr (; ) = false) or (ad (; ; ) = true and cr (; ) = false and ad (; ; )=false) for some par of (; ). Te algortm FA, wc ncludes te update rule of te above varables, s sown n Fg. 4. Teorem 1 Every addtonal cecpont taen by FA s necessary. Teorem 1 s obvous from te above dscusson. (E(FA)) s consstent for any cec- Teorem FG x pont ntaton c x. (Proof) Assume tat FG x s not consstent and c x FG x ())! c x (= FG x ()). From te FG decson rule, c x 01! c x and cx 6! c x f 6=. (Case 1: = ) c x! cx contradcts te above fact. (Case : = ) Let te last message on te causal sequence from c x to c x be m. Snce c x 01! c x and c x (=! r(m), n () = true at r(m). From Rule F1, p must ave taen te x -t cecpont before r(m). contradcts te asserton tat c x s after r(m). Ts (Case 3: 6= and 6= ) Tere s a causal sequence CS from c x 01 to c x. Let te sequence of messages n CS be M 1 ;M ;:::;M l. Let te process tat executes r(m a ) be p za (a = 1;:::;l). Wtout loss of generalty, p za satsfes c za () <x 0 1 before r(m a ) (a = 1;:::;l). Note tat c x 6! e for any event e n CS. Oterwse, cx! cx and ts contradcts te FG decson rule. Let te last event e n CS tat satsfes e! c x be e 0 on p. Suc an event always exsts because s(m 1 )! c x.if s(m 1) s after c x, c x! c x and ts contradcts te FG decson rule. Let e = cp x (), tat s, let e be p s last event nown to p at c x. From te defnton, e0! e. (Case 3-1: e 0 s receve event r(m)) From te assumpton, te next send event n CS s after e. Tere s a causal
4 sequence from e to c x. Let r(m0 ) be te last receve event n te causal sequence. Snce c () = x 0 1 and c () <x at e, cr (; ) =true and cr (; ) =false at r(m 0 ). Tus, p must ave taen te x -t cecpont before r(m 0 ) from Rule F. (Case 3-: e 0 s send event s(m)) Let te recever of M be p g and let e g = cp x (g). From te assumpton, r(m) s after e g. ad (g; ; ) = true, cr (g; ) = false, and ad (g; ; ) =false are satsfed at r(m 0 ) snce c g () < x 01, c g () <x at e g and c g ()=x 01, c g () <x at r(m). Tus, p must ave taen te x -t cecpont before r(m 0 ) from Rule F. Te nformaton pggybaced on eac message and ept n eac process s O(n) nteger and O(n 3 ) boolean values. 4 Algortm LA for LG c Consder te case wen p realzes p s ntaton c x at receve event cf x (). Let te message be m and ts sender be p. Cecpontng algortm A sets LG x (E(A);) as p s newest cecpont or taes a new addtonal cecpont before r(m) and sets LG x (E(A);) as te new one. In eter case, LG x (E(A);) s te last cecpont tat s not after cf x (). LA must decde weter t taes a new addtonal cecpont before r(m) n order to mae LG x consstent wt te mnmum number of addtonal cecponts. Assume tat p as taen (x 01) cecponts before te arrval of m. Te cases wen te x -t cecpont must be taen before r(m) are sown n Fg. 5. Te frst case s wen tere s a cecpont c x suc tat cx01! c x and cx! r(m) are satsfed. Tere s an ntaton c x tat satsfes LGx ()= c x. LGx s not consstent f cx s not taen before r(m) because c x01! c x. Tus, an addtonal cecpont s necessary. Ts condton s represented as follows. Consder a varable see (). see () =true f p nows a cecpont c tat satsfes c x! c for p s current cecpont c x. (Rule L1) see ()=true. Te second case s wen p sends a message m 0 to process p after c x 01 and neter LG x () nor LG x () as been decded. Ts addtonal cecpont s necessary f p sends message m 00 to p after r(m) and p executes r(m 0 ), taes a cecpont c x, and ten executes r(m00 ). Now, snce cf x () = r(m 00 ), LG x () s c x or an addtonal cecpont tat s taen ust before r(m 00 ). In eter case, c x01! LG x () and LG x s not consstent f LG x () =x 0 1. Terefore, p must tae an addtonal cecpont before r(m). Ts case s represented as follows. Varable num ()= x f p nows te newest ntaton by p s c x. Varable dc (; )=true f p nows tat p as decded te element of LG x (), were x = num (). Varable st () =true f p as sent a message to p after p s latest (te c ()-t) cecpont. (Rule L) dc (; ) = false, dc (; ) = false, and st ()=true for some par of (; ). Algortm LA, wc ncludes te rule for updatng tese varables, s sown n Fg. 6. LG x () s stored n varable lg. lg (; x )=yf LG x () =c y. Note tat lg (; x ) mgt be undefned for two reasons. Frst, p does not now ntaton c x x, tat s, cf ()=> at a gven state. In suc a case, LG x ()=>. Te second case s wen cf x ()= cf x0 (), tat s, te nformaton for two dfferent ntatons by p arrves at p at te same tme. Te nformaton about old ntatons s dscarded because LG x () = LG x0 (). Tus, f lg (; x) s undefned for every x(x 0 <x<x ) and lg (; x ) s defned, lg (; x) = lg (; x ) for any ntaton c x (x 0 <x<x ). Teorem 3 Every addtonal cecpont taen by LA s necessary. Teorem 3 s obvous from te above dscusson. Lemma 1 [7] If a global cecpont (c 1 ;c ;:::;c n ) s not consstent, tere s a par (c ;c ) suc tat tere s a causal sequence from c to c wose lengt s 1. Teorem 4 LG x (E(LA)) s consstent for any cecpont ntaton c x. (Proof) Assume tat LG x s not consstent. From Lemma 1, assume tat c x (= LG x ())! c x (= LG x ()) and let te message n te causal sequence be m. Let e x be te event wen p decdes LG x (). Note tat LG x () mgt be decded by decdng LG x0 () for x 0 > x as descrbed above. In suc a case, e x = e x0. e x s an ntaton, a receve event, or > (n ts case, LG x () = > ). If e x s a receve event, LG x () s before e x. In te oter cases, ex = LG x (). Tus, LG x ()! e x s satsfed. Note tat LG x () s p s newest cecpont at e x. num () <x s satsfed before e x and num () x s satsfed after e x c x. 6= > snce tere s an event s(m) after c x (Case 1: e x! e x ) Snce cx s p s newest cecpont at e x and cx! cx! e x! e x, see ()=true at e x. Tus, c x must be te newly taen cecpont ust before e x from Rule L1. Ts contradcts te noton tat tere s an event s(m) between c x and ex. (Case : e x s before s(m)) num () x must be satsfed at r(m). Tus, e x must be equal to or before r(m). Ts contradcts te noton tat c x s after r(m). (Case 3: e x 6! e x and ex s after s(m)) Snce ex 6! e x, dc (; )=false at e x. Snce tere s an event s(m) between c x and ex, ex s a receve event. Let X = num () at e x. X x s satsfed. Snce st ()=true.
5 and dc (; )=false at e x, cx must be te newly taen cecpont ust before e x from Rule L. Ts contradcts te noton tat tere s an event s(m) between c x and ex. Te nformaton pggybaced on eac message and ept n eac process (oter tan te output) s O(n) nteger and O(n ) boolean values. Here, te rule for removng old cecponts s sown. Te amount of stable storage usage becomes large f old cecponts are not removed. Assume tat p rolls bac to te newest ntaton by p. p mgt be forced to roll bac to lg (; num()). Tus, p does not need te cecponts before mn lg (; num()) and tese cecponts can be removed. 5 Concluson Ts paper sowed two dstrbuted algortms tat mae te frst and last global cecpont consstent wt a mnmum number of addtonal cecponts taen n eac process. Remanng problems nclude reducng te amount of nformaton used by te algortms. Acnowledgments Te autor would le to tan Dr. Hrofum Katsuno of NTT for s encouragement and suggestons. References [1] Baldon, R., Helary, J.M., Mostefaou, A., and Raynal, M.: Consstent Cecpontng n Message Passng Dstrbuted Systems, INRIA Tecncal Report No. 564 (June 1995). [] Candy, K.M. and Lamport, L.: Dstrbuted Snapsots: Determnng Global States of Dstrbuted Systems, ACM Transacton on Computer Systems, Vol. 3, No. 1, pp (Feb. 1985). [3] Lamport, L.: Tme, Clocs, and te Orderng of Events n a Dstrbuted System, Communcatons of ACM, Vol. 1, No. 7, pp (July 1978). [4] Manabe, Y. and Imase, M.: Global Condtons n Debuggng Dstrbuted Programs, Journal of Parallel and Dstrbuted Computng, Vol. 15, No. 1, pp (May 199). [5] Manabe, Y.: A Dstrbuted Frst and Last Consstent Global Cecpont Algortm, IPSJ SIG Notes, AL (Oct. 1996). [6] Manabe, Y.: A Dstrbuted Consstent Global Cecpont Algortm wt a Mnmum Number of Cecponts, Tecncal Report of IEICE, COMP97-6 (Apr. 1997). [7] Manabe, Y.: A Dstrbuted Consstent Global Cecpont Algortm wt a Mnmum Number of Cecponts, Proc. of 1t Int. Conf. on Informaton Networng (Jan. 1998). [8] Netzer, R.H. and Xu, J.: Necessary and Suffcent Condtons for Consstent Global Snapsots, IEEE Trans. on Parallel and Dstrbuted Systems, Vol. 6, No., pp (Feb. 1995). [9] Strom, R.E. and Yemn, S.: Optmstc Recovery n Dstrbuted Systems, ACM Trans. on Computer Systems, Vol.3, No.3, pp.04 6 (Aug. 1985). [10] Venates, K., Radarsnan, T., and L, H.F.: Optmal Cecpontng and Local Recordng for Domno-Free Rollbac Recovery, Informaton Processng Letters, Vol. 5, No. 5, pp (July 1987). process p p p p Ý Ý Ý Ý m 1 c 1 m 1 e 1 m 1 c 3 c 1 c 1 4 m 4 3 tme c e c 1 m5 4 m 6 Ý 1 Ý Ý Ý 3 4 : message : cecpont : ntaton Fgure 1. System executon E. c x p m p p p p c x 1 c x r(m) cp r(m) () c x x c c x cp r(m) m r(m) :ntaton or addtonal cecpont :ntaton :addtonal cecpont Fgure. Rule F1. c x 1 m p p p c x 1 cp r(m) () c x x c x c cp r(m) m r(m) Fgure 3. Rule F.
6 program FA; /* program for p.*/ const n = :::; /* number of processes */ var c(n): nteger; n(n), cr(n; n), ad(n; n; n): boolean; procedure cecpont begn tae a cecpont; c() := c()+ 1; n() :=false; for eac (6= ) do cr(; ) :=false; for eac (6= ); do ad(; ; ) :=false; for eac (6= ); do ad(; ; ) :=false; end; /* end of subroutne */ /* man */ ntalzaton begn for eac (6= ) do c() := 01; c() := 0; for eac do n() :=false; for eac (6= );do cr(; ) :=false; for eac do cr(; ) := true; for eac ; ; l do ad(; ; l) :=false; end /* end of ntalzaton */ wen p ntates a cecpont begn cecpont; for eac 6= do n() :=true; end /* end of cecpont ntaton */ wen p sends m to p begn send(m, c, n, cr, ad)top ; for eac do f not(cr(; )) and not(ad(; ; )) ten for eac do ad(; ; ) :=true; end /* end of message sendng */ wen message (m, mc, mn, mcr, mad) arrves from p begn for eac do begn f c() < mc() ten begn n() := mn(); for eac (6= ) do cr(; ) := mcr(; ); for eac (6= );ldo f mc(l) c(l) ten ad(; ; l) := mad(; ; l) else ad(; ; l) :=false; end /* end of case c() < mc() */ else f c()=mc() ten begn n() := n() _ mn(); for eac (6= ) do cr(; ) := cr(; ) _ mcr(; ); for eac (6= );ldo f mc(l) >c(l) ten f ad(; ; ) ten ad(; ; l) :=false else ad(; ; l) := mad(; ; l) else f mc(l)=c(l) ten f (cr(; l) or mcr(,l) or (ad(; ; ) and not(ad(; ; l))) or (mad(; ; ) and not(mad(; ; l))) ten ad(; ; l) :=false else ad(; ; l) := ad(; ; l) _ mad(; ; l) else /* mc(l) <c(l) */ f mad(; ; ) ten ad(; ; l) :=false; end /* end of case c()=mc() */ else /* c() > mc() */ for eac (6= );ldo f mc(l) >c(l) ten ad(; ; l) :=false end; /* end of f statement */ end; /* end of loop by. */ for eac (6= ) do c() := max(c(); mc()); f n() or 9(; ), ((cr(; ) and not(cr(; ))) or (ad(; ; ) and not(cr(; )) and not(ad(; ; )))) ten cecpont; execute r(m); end /* end of message arrval */ Fgure 4. Algortm FA. c x LG x p p c x m p c x 1 c x r(m) p p p x c c x 1 c x m c x x LG m r(m) m" Fgure 5. Rule L1 and L. program LA; /* program for p.*/ const n = :::; /* number of processes */ var c(n), num(n), lg(n; 3): nteger; dc(n; n), see(n), st(n): boolean; procedure cecpont begn tae a cecpont; c() := c()+ 1; for eac do st() :=false; for eac (6= ) do see() :=true; see() :=false end; /* end of subroutne */ /* man */ ntalzaton begn for eac 6= do c() := 01; c() := 0; for eac do num() := 0; for eac ; do dc(; ) :=true; for eac do see() :=false; for eac do st() :=false; end /* end of ntalzaton */ wen p ntates a cecpont begn cecpont; num() := c(); for eac (6= ) do dc(; ) :=false; end /* end of cecpont ntaton */ wen p sends m to p begn send(m, c, num, see, dc) top ; st() :=true; end /* end of message sendng */ wen message (m, mc, mnum, msee, mdc) arrves from p begn for eac do begn f num() < mnum() ten for eac do dc(; ) := mdc(; ); else f num()=mnum() ten for eac do dc(; ) := dc(; ) _ mdc(; ); end /* end of loop by */ for eac do num() := max(num(); mnum()); for eac do f c() < mc() ten see() := msee() else f c()=mc() ten see() := see() _ msee(); for eac do c() := max(c(); mc()); f see() or 9(; ), (not(dc(; )) and not(dc(; )) and st()) ten cecpont; for eac do f not(dc(; )) ten begn dc(; ) :=true; lg(; num()) := c(); end; execute r(m); end /* end of message arrval */ Fgure 6. Algortm LA.
Machine Learning. K-means Algorithm
Macne Learnng CS 6375 --- Sprng 2015 Gaussan Mture Model GMM pectaton Mamzaton M Acknowledgement: some sldes adopted from Crstoper Bsop Vncent Ng. 1 K-means Algortm Specal case of M Goal: represent a data
More informationPriority queues and heaps Professors Clark F. Olson and Carol Zander
Prorty queues and eaps Professors Clark F. Olson and Carol Zander Prorty queues A common abstract data type (ADT) n computer scence s te prorty queue. As you mgt expect from te name, eac tem n te prorty
More informationSection 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More informationThe AVL Balance Condition. CSE 326: Data Structures. AVL Trees. The AVL Tree Data Structure. Is this an AVL Tree? Height of an AVL Tree
CSE : Data Structures AL Trees Neva Cernavsy Summer Te AL Balance Condton AL balance property: Left and rgt subtrees of every node ave egts dfferng by at most Ensures small dept ll prove ts by sowng tat
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationTransaction-Consistent Global Checkpoints in a Distributed Database System
Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback
More informationInvestigations of Topology and Shape of Multi-material Optimum Design of Structures
Advanced Scence and Tecnology Letters Vol.141 (GST 2016), pp.241-245 ttp://dx.do.org/10.14257/astl.2016.141.52 Investgatons of Topology and Sape of Mult-materal Optmum Desgn of Structures Quoc Hoan Doan
More informationBounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationMore on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationIntroduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time
Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationA SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES
A SYSOLIC APPROACH O LOOP PARIIONING AND MAPPING INO FIXED SIZE DISRIBUED MEMORY ARCHIECURES Ioanns Drosts, Nektaros Kozrs, George Papakonstantnou and Panayots sanakas Natonal echncal Unversty of Athens
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationAn Analytical Tool to Assess Readiness of Existing Networks for Deploying IP Telephony
An Analytcal Tool to Assess Readness of Exstng Networks for Deployng IP Telepony K. Sala M. Almasar Department of Informaton and Computer Scence Kng Fad Unversty of Petroleum and Mnerals Daran 31261, Saud
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationA Polylog Time Wait-Free Construction for Closed Objects
A Polylog Tme Wat-Free Constructon for Closed Obects Tusar Deepak Candra Prasad Jayant Kng Tan IBM T.J.Watson Researc Center Dartmout College Dartmout College tusar@watson.bm.com prasad@cs.dartmout.edu
More informationMode-seeking by Medoidshifts
Mode-seekng by Medodsfts Yaser Ajmal Sek Robotcs Insttute Carnege Mellon Unversty yaser@cs.cmu.edu Erum Arf Kan Department of Computer Scence Unversty of Central Florda ekan@cs.ucf.edu Takeo Kanade Robotcs
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationInformation Sciences
Informaton Scences 79 (9) 369 367 ontents lsts avalable at ScenceDrect Informaton Scences ournal homepage: www.elsever.com/locate/ns Necessary and suffcent condtons for transacton-consstent global checkponts
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationNeeded Information to do Allocation
Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to
More informationA NOTE ON FUZZY CLOSURE OF A FUZZY SET
(JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,
More informationF Geometric Mean Graphs
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.
More informationBridges and cut-vertices of Intuitionistic Fuzzy Graph Structure
Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -
More informationTF 2 P-growth: An Efficient Algorithm for Mining Frequent Patterns without any Thresholds
TF 2 P-growth: An Effcent Algorthm for Mnng Frequent Patterns wthout any Thresholds Yu HIRATE, Ego IWAHASHI, and Hayato YAMANA Graduate School of Scence and Engneerng, Waseda Unversty {hrate, ego, yamana}@yama.nfo.waseda.ac.jp
More informationPass by Reference vs. Pass by Value
Pass by Reference vs. Pass by Value Most methods are passed arguments when they are called. An argument may be a constant or a varable. For example, n the expresson Math.sqrt(33) the constant 33 s passed
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More informationLecture 5: Probability Distributions. Random Variables
Lecture 5: Probablty Dstrbutons Random Varables Probablty Dstrbutons Dscrete Random Varables Contnuous Random Varables and ther Dstrbutons Dscrete Jont Dstrbutons Contnuous Jont Dstrbutons Independent
More information3.6 Directional Derivatives and the Gradient Vector
288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te
More informationAMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain
AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationIPP-HURRAY! Research Group. Polytechnic Institute of Porto School of Engineering (ISEP-IPP)
IPP-HURRAY! Researc Group Polytecnc Insttute of Porto Scool of Engneerng (ISEP-IPP) Desgnng Real-Tme Systems Based on Mono-Master Profbus-DP Networks r Salvatore MONFORTE Máro ALVES Francsco VASQUES (FEUP)
More informationUNIT 2 : INEQUALITIES AND CONVEX SETS
UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces
More informationThe ray density estimation of a CT system by a supervised learning algorithm
Te ray densty estaton of a CT syste by a suervsed learnng algort Nae : Jongduk Baek Student ID : 5459 Toc y toc s to fnd te ray densty of a new CT syste by usng te learnng algort Background Snce te develoent
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationSolitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis
Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationSymmetric Tree Replication Protocol for Efficient Distributed Storage System*
ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationRamsey numbers of cubes versus cliques
Ramsey numbers of cubes versus clques Davd Conlon Jacob Fox Choongbum Lee Benny Sudakov Abstract The cube graph Q n s the skeleton of the n-dmensonal cube. It s an n-regular graph on 2 n vertces. The Ramsey
More informationCHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION
24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and
More informationLecture 4: Principal components
/3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationCHAPTER 2 DECOMPOSITION OF GRAPHS
CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng
More informationKFUPM. SE301: Numerical Methods Topic 8 Ordinary Differential Equations (ODEs) Lecture (Term 101) Section 04. Read
SE3: Numercal Metods Topc 8 Ordnar Dfferental Equatons ODEs Lecture 8-36 KFUPM Term Secton 4 Read 5.-5.4 6-7- C ISE3_Topc8L Outlne of Topc 8 Lesson : Introducton to ODEs Lesson : Talor seres metods Lesson
More informationMulti-Stack Boundary Labeling Problems
Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationUSING GRAPHING SKILLS
Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More informationExact solution, the Direct Linear Transfo. ct solution, the Direct Linear Transform
Estmaton Basc questons We are gong to be nterested of solvng e.g. te followng estmaton problems: D omograpy. Gven a pont set n P and crespondng ponts n P, fnd te omograpy suc tat ( ) =. Camera projecton.
More informationPiecewise Polynomial Interpolation, cont d
Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined
More informationOn-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System
00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te
More informationTest Generation for Acyclic Sequential Circuits with Hold Registers
Test Generation for Acyclic Sequential Circuits wit Hold Registers Tomoo Inoue, Debes Kumar Das, Ciio Sano, Takairo Miara, and Hideo Fujiwara Faculty of Information Sciences Computer Science and Engineering
More informationReal-time interactive applications
Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet
More information1 Dynamic Connectivity
15-850: Advanced Algorthms CMU, Sprng 2017 Lecture #3: Dynamc Graph Connectvty algorthms 01/30/17 Lecturer: Anupam Gupta Scrbe: Hu Han Chn, Jacob Imola Dynamc graph algorthms s the study of standard graph
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More informationSecure Index Coding: Existence and Construction
Secure Index Codng: Exstence and Constructon Lawrence Ong 1, Badr N. Vellamb 2, Phee Lep Yeoh 3, Jörg Klewer 2, and Jnhong Yuan 4 1 The Unversty of Newcastle, Australa; 2 New Jersey Insttute of Technology,
More informationCordial and 3-Equitable Labeling for Some Star Related Graphs
Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,
More informationComparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments
Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationGSLM Operations Research II Fall 13/14
GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are
More informationCHAPTER 7: TRANSCENDENTAL FUNCTIONS
7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationLecture #5.3 Mirrors
Lecture #5.3 Mrrrs We ave already dscussed reflectn f EM waves. Ts penmenn fnds useful applcatn n te devces we use n ur everyday lfe. Tday we sall talk abut w reflectn wrks n rder t prduce mages n dfferent
More informationSimultaneous Gate Sizing and Fanout Optimization
Smultaneous Gate Szng and Fanout Optmzaton We Cen *, Ceng-Ta Hse +, Massoud Pedram * * Unversty of Soutern Calforna + VerplexSystems,Inc. Los Angeles, CA 90089 Mlptas, CA 95035 Abstract Ts paper descrbes
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationStrategies for Improving the Quality of Polling Service in
CSCC 2017 Strateges for Improvng te Qualty of Pollng Servce n Wreless Metropoltan Area etwork Z-Jun Yan g 1, 2, Yang Su 1,*, Hong-We Dng 1 and Yang-Yang Dng 1 1 Scool of Informaton Scence and Engneerng,
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationAn Anchor Chain Scheme for IP Mobility Management
An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.
More informationAvoiding congestion through dynamic load control
Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach
More informationsuch that is accepted of states in , where Finite Automata Lecture 2-1: Regular Languages be an FA. A string is the transition function,
* Lecture - Regular Languages S Lecture - Fnte Automata where A fnte automaton s a -tuple s a fnte set called the states s a fnte set called the alphabet s the transton functon s the ntal state s the set
More informationSUV Color Space & Filtering. Computer Vision I. CSE252A Lecture 9. Announcement. HW2 posted If microphone goes out, let me know
SUV Color Space & Flterng CSE5A Lecture 9 Announceent HW posted f cropone goes out let e now Uncalbrated Potoetrc Stereo Taeaways For calbrated potoetrc stereo we estated te n by 3 atrx B of surface norals
More informationLoop-Free Multipath Routing Using Generalized Diffusing Computations
1 Loop-Free Multpath Routng Usng Generalzed Dffusng Computatons Wllam T. Zaumen J.J. Garca-Luna-Aceves Sun Mcrosystems, Inc. Computer Engneerng Department 901 San Antono Avenue School of Engneerng Palo
More informationIP mobility support is becoming very important as the
706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded
More informationUnsupervised Learning for Hierarchical Clustering Using Statistical Information
Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama
More informationSorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions
Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationMidpoint routing algorithms for Delaunay triangulations
See dscussons, stats, and author profles for ths publcaton at: https://www.researchgate.net/publcaton/224140686 Mdpont routng algorthms for Delaunay trangulatons CONFERENCE PAPER MAY 2010 DOI: 10.1109/IPDPS.2010.5470471
More informationYou Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.
1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation
More informationOn Correctness of Nonserializable Executions
Journal of Computer and System Scences 56, 688 (1998) Artcle No. SS971536 On Correctness of Nonseralzable Executons Rajeev Rastog,* Sharad Mehrotra, - Yur Bretbart, [,1 Henry F. Korth,* and Av Slberschatz*
More informationReport on On-line Graph Coloring
2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm
More informationeach node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree.
Data Structures CSC212 1 AVL Trees A binary tree is a eigt-balanced-p-tree if for eac node in te tree, te difference in eigt of its two subtrees is at te most p. AVL tree is a BST tat is eigt-balanced-tree.
More informationMathematical Analysis of IEEE Energy Efficiency
Matematcal Analyss of IEEE 02.11 Energy Effcency e-mal: Andrea Zanella and Francesco De Pellegrn Dpartmento d Ingegnera dell Informazone nverstà d Padova va Gradengo /b 35121 Padova Italy andrea.zanellafrancesco.depellegrn
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationarxiv: v1 [cs.pf] 1 Oct 2016
Data-Unt-Sze Dstrbuton Model wt Retransmtted Packet Sze Preservaton Property and Its Applcaton to Goodput Analyss for Stop-and-Wat Protocol: Case of Independent Packet Losses Takas Ikegawa Abstract arxv:1610.00149v1
More informationCell Count Method on a Network with SANET
CSIS Dscusson Paper No.59 Cell Count Method on a Network wth SANET Atsuyuk Okabe* and Shno Shode** Center for Spatal Informaton Scence, Unversty of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-8656, Japan
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationData Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach
Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationRational Interpolants with Tension Parameters
Ratonal Interpolants wt Tenson Parameters Gulo Cascola and Luca Roman Abstract. In ts paper we present a NURBS verson of te ratonal nterpolatng splne wt tenson ntroduced n [2], and we extend our proposal
More information