A Distributed First and Last Consistent Global Checkpoint Algorithm

Size: px
Start display at page:

Download "A Distributed First and Last Consistent Global Checkpoint Algorithm"

Transcription

1 A Dstrbuted Frst and Last Consstent Global Cecpont Algortm Yosfum Manabe NTT Basc Researc Laboratores 3-1 Mornosato-Waamya, Atsug-s, Kanagawa Japan Abstract Dstrbuted coordnated cecpontng algortms are dscussed. Te frst global cecpont for a cecpont ntaton s a set contanng te cecpont for eac process n wc any cecpont before te element s not consstent wt te ntaton. Te last global cecpont for a cecpont ntaton s a set contanng te cecpont for eac process n wc any cecpont after te element s not consstent wt te ntaton. Ts paper presents dstrbuted algortms tat mae te frst and last global cecponts consstent wt a mnmum number of cecponts taen n eac process. 1 Introducton Dstrbuted coordnated cecpontng obtans a set of states as a consstent global cecpont [8], n wc no message s recorded as receved n one process and as not yet sent n anoter process. It can be used for process rollbac 1. Wen a process ntates cecpontng, addtonal cecponts must be taen n oter processes n order to obtan a consstent global cecpont tat ncludes te ntaton. Dfferent global cecponts mgt be obtaned dependng on te addtonal cecponts taen by eac process. Ts paper consders two cases and defnes two nds of global cecpont. Te frst case s recovery from falure. Wen process p experences a falure, all processes roll bac to eac state n a consstent global cecpont. Te addtonal rollbac for processes oter tan p must be as small as possble n order to mnmze te overead of reexecuton. Tus, t s better for te oter processes to roll bac to latter cecponts. Te second case s rollbac n debuggng. Assume tat p rolls bac to a state wen an error s observed. Te bug mgt be n process p and a wrong 1 In order to roll bac, te messages wc ave been sent but not receved must be restored. Te message restoraton metod s smlar to tat n [9] and te detals are gven n [6]. Ts paper tus dscusses obtanng a consstent global cecpont. message from p mgt ave caused te error. Tus, te debugger user wants to observe eac process n a consstent global state. If a latter cecpont s used for p s rollbac, te bug mgt be dden by furter executon of p ; for example, extng from a subroutne and deletng all varables tat decded te content of te wrong message [4]. Tus, t s better for te oter processes to roll bac to former cecponts. Ts paper tus defnes two global cecponts: te frst and last global cecponts [5]. Te frst (last) global cecpont for a cecpont ntaton s a set contanng te cecpont for eac process n wc any cecpont before (after) te element s not consstent wt te ntaton. Ts paper ten gves two dstrbuted algortms tat mae te frst and last global cecpont consstent wt te mnmum number of addtonal cecponts taen n eac process. Toug ndependent cecpontng algortms, suc as tat n [9], do not need consstent global cecponts, tey can be used only for systems n wc all non-determnstc events can be recorded durng executon and replayed durng re-executon. For systems n wc records of nondetermnstc events can be very large or replayng nondetermnstc events s dffcult, a consstent global cecpont s necessary. Candy et al. s dstrbuted snapsot algortm [] obtans a consstent global cecpont (neter te frst nor te last) for concurrent ntatons. Te autor [7] extended ter algortm and te extended verson mnmzes te number of addtonal cecponts. Venates et al. s algortm [10] obtans a last global cecpont tat s consstent, and Baldon et al. s algortm [1] obtans a frst global cecpont tat s consstent, but tey dd not defne te concept of frst and last global cecponts. Ter algortms do not mnmze te number of addtonal cecponts. Te frst and last global cecpont Te dstrbuted system s modeled by a fnte set of processes fp 1 ;p ;:::;p n g nterconnected by pont-to-pont cannels. Cannels are assumed to be error-free, non-fifo, and ave nfnte capacty. Te communcaton s asyn-

2 cronous; tat s, te delay experenced by a message s unbounded but fnte. p s executon s a sequence of p s events wc nclude cecpont ntatons. Cecpont ntatons are done ndependently by eac process. System executon E s te set of eac process s executons. p s executon wt cecpontng algortm A s p s executon nterleaved wt te addtonal cecponts taen by A n p. System executon wt A, E(A), s te set of eac process s executon wt A. Te followng assumptons are common for dstrbuted cecpontng algortm A [1][10]. A as no pror nowledge about executon E. All nformaton for A s pggybaced on program messages between processes. Wen p receves a message m, A can get te nformaton pggybaced on m and tae an addtonal cecpont before p executes te receve event. Te appened before(!) relaton between te events n E(A) s defned as follows [3]. Defnton 1 e! e 0 f and only f (1) e and e 0 are executed n te same process and e s not executed after e 0. () e s te send event s(m) and e 0 s te receve event r(m) of te same message m. (3) e! e 00 and e 00! e 0 for event e 00. Wen e and e 0 are executed n dfferent processes and e! e 0, tere s a sequence of events e; s(m 1 );r(m 1 );s(m );:::;s(m );r(m );e 0 n wc e! s(m 1 ), r(m )! s(m +1)( = 1;:::; 0 1), r(m )! e 0, every par of events s executed n te same process, and every s(m ) s executed n a dfferent process. Ts sequence s called a causal sequence from e to e 0. s te lengt of te causal sequence. Two specal events,? and >, are defned for p.? s an magnary event wc s p s ntal state. > s p s current event f p s not termnated. If p s termnated, > s an magnary event wc s p s termnal state. For any p event e,?! e and e!> old. Ts paper consders > and? as cecponts n E. For p s event e n E(A), two events on p, causal-past event, cp e (), and causal-future event, cf e (), are defned as follows. Defnton cp e ()=cf e ()=e. cp e () s last event e n p tat satsfes e! e.if tere s no event e satsfyng e! e, cp e ()=?. cf e () s frst event e n p tat satsfes e! e.if tere s no event e satsfyng e! e, cf e ()=>. Intutvely, cp e () s p s last event wc s nown to p at e. cf e () s p s frst event wc nows e. In Fg. 1, cp c1 (1) =s(m 1 ), cp c1 () =c 1, cpc1 (3) =s(m ), cp c1 (4) =? 4, cf c1 (1) = > 1, cf c1 () = c 1, cf c1 (3) = r(m 5 ), and cf c1 (4)=r(m 6 ). Defnton 3 A par of cecponts (c; c 0 ) s consstent f and only f c 6! c 0 and c 0 6! c. Defnton 4 A global cecpont (c 1 ;c ;:::;c n ) s n-tuple of cecponts were c s p s cecpont. A global cecpont s consstent f and only f all dstnct pars of cecponts are consstent. Defnton 5 Te frst global cecpont for p s cecpont ntaton c n E(A), FG c (E(A)), s defned as follows. -t element, FG c (E(A);), s te frst cecpont n p wc s not before cp c (). E(A) s omtted f t s obvous. Defnton 6 Te last global cecpont for p s cecpont ntaton c n E(A) LG c (E(A)), s defned as follows. -t element, LG c (E(A);), s te last cecpont n p wc s not after cf c (). FG c (E(A);) (or LG c (E(A);)) = > means tat p need not roll bac at all wen p rolls bac to c. Any cecpont of p before cp c () or after cf c () s not consstent wt c c. Tus, FG c (E(A)) and LG c (E(A)) are te best possble former and latter global cecponts for c. In Fg. 1, FG c1 (E) = (c 1 1 ;c1 ;c1 3 ;? 4) and LG c1 (E) = (> 1 ;c 1 ;c1 3 ;c 4). FG c1 (E) s not consstent snce c 1 1! c1 3. LGc1 (E) s not consstent snce c 1 3! c 4. Toug FG c (E) and LG c (E) mgt not be consstent, FG c (E(A)) and LG c (E(A)) can be consstent by te addtonal cecponts taen by A. In Fg. 1, f A taes an addtonal cecpont at e 1, FG c1 (E(A); 3) =e 1 and FG c1 (E(A)) s consstent. If A 0 taes an addtonal cecpont at e, LG c1 (E(A 0 ); 3) =e and LG c1 (E(A 0 )) s consstent. If algortm A 0 taes an addtonal cecpont ust before every receve event, FG c (E(A 0 )) and LG c (E(A 0 )) s consstent for any cecpont ntaton c. However, te overead of A 0 s very large. Ts paper sows two dstrbuted cecpontng algortms, FA and LA. Among algortm A wc maes every FG c (E(A)) (LG c (E(A))) consstent, FA (LA) taes te mnmum number of addtonal cecponts. Our algortms deal wt cecpont ntatons and addtonal cecponts dfferently. If a user wants to deal wt an addtonal cecpont as an ntaton, ts can be done by executng te cecpont ntaton procedure for te addtonal cecpont.

3 3 Algortm FAfor FG c In te rest of te paper, a sequence number s assgned for (bot of ntaton and addtonal) cecponts n eac process n E(A).? s p s 0-t cecpont. Let c x be p s x -t cecpont. It s sometmes denoted as x n subscrpts f t s not ambguous. p mantans a varable c (). c ()=xf p currently nows p s cecpont c x. c () = 01 fp currently nows no cecpont n p.if c ()=x( 0) at event e, c x! e and c ()=x at cp e () s satsfed. c () s p s newest cecpont number. Updatng c can be done by sendng ts current value on every message. Ts s sown n detal n Fg. 4. For any algortm A, FG c (E(A)) for p s cecpont ntaton c can be represented usng c as follows: Let CK() be te value of c () at c. FG c () = c CK()+1 ( 6= ). If te (CK()+1)-t cecpont does not exst n p, FG c () =>. In order to mae t consstent, FA taes addtonal cecponts. Now consder te case wen a message m from p arrves at p. Assume tat p as taen (x 0 1) cecponts before te arrval of m. Te frst case wen te x -t cecpont must be taen before r(m) s sown n Fg.. p nows p s cecpont ntaton c x and cx 01! c x. Snce p nows te ntaton, c x! r(m) s satsfed. If p does not tae te x -t cecpont before r(m), c x! r(m)! cx (= FG x ()) and FG x s not consstent. Ts condton s represented as follows. Consder a varable n (). n () =true f p nows a cecpont ntaton c tat satsfes c x! c for p s current cecpont c x. Te followng s p s rule for tang a cecpont before r(m). (Rule F1) n ()=true. Te update rule of n s sown n Fg. 4. Te second case s sown n Fg. 3. In ts case p mgt ntate a cecpont after e = cp r(m) (). Toug ts cecpont s unnecessary f p actually does not ntate after e, p taes t snce p cannot predct p s executon after e at r(m). Ts case s dvded nto two subcases. Te frst subcase s wen p nows p s current (te (x 0 1)-t) cecpont at e. p ntates cecpont c x ust after e. Assume tat tere s a cecpont c x tat satsfes cx! r(m) and c x 6! e. Snce c x 6! e, FG x from te decson ()! c x rule of FG.Ifp does not tae te x -t cecpont before r(m), FG x ()! c x! r(m)! cx (= FG x ()) and FG x s not consstent. Te second subcase s wen p does not now p s (x 0 1)-t cecpont at e. In order for p to ntate a cecpont tat satsfes FG x ()=x, p must frst receve a message tat carres te nformaton of c x01 and ten ntate. Assume tat tere s a message m 0 sent to p but not receved before e, wc carres te nformaton about c x01. Assume also tat p receves m 0 ust after e and ten ntates a cecpont c x. Furter assume tat tere s a cecpont c x tat satsfes cx! r(m) and cx 6! r(m0 ). Snce c x 6! r(m0 ), FG x ()! c x. If p does not tae te x -t cecpont before r(m), c x! r(m)! cx and FG x s not consstent. Ts condton s represented as follows. Introduce boolean varable cr (; ) and ad (; ; ). cr (; )=true f p nows tat p nows p s current (te c ()-t) cecpont. Note tat cr (; ) s always true for every. ad (; ; )=true f p nows tat p wll now p s current (te c ()-t) cecpont f p receves any message sent to p tat carres p s current (te c ()-t) cecpont. If p already nows p s current cecpont or suc a message does not exst, ad (; ; )=false. (Rule F) (cr (; ) = true and cr (; ) = false) or (ad (; ; ) = true and cr (; ) = false and ad (; ; )=false) for some par of (; ). Te algortm FA, wc ncludes te update rule of te above varables, s sown n Fg. 4. Teorem 1 Every addtonal cecpont taen by FA s necessary. Teorem 1 s obvous from te above dscusson. (E(FA)) s consstent for any cec- Teorem FG x pont ntaton c x. (Proof) Assume tat FG x s not consstent and c x FG x ())! c x (= FG x ()). From te FG decson rule, c x 01! c x and cx 6! c x f 6=. (Case 1: = ) c x! cx contradcts te above fact. (Case : = ) Let te last message on te causal sequence from c x to c x be m. Snce c x 01! c x and c x (=! r(m), n () = true at r(m). From Rule F1, p must ave taen te x -t cecpont before r(m). contradcts te asserton tat c x s after r(m). Ts (Case 3: 6= and 6= ) Tere s a causal sequence CS from c x 01 to c x. Let te sequence of messages n CS be M 1 ;M ;:::;M l. Let te process tat executes r(m a ) be p za (a = 1;:::;l). Wtout loss of generalty, p za satsfes c za () <x 0 1 before r(m a ) (a = 1;:::;l). Note tat c x 6! e for any event e n CS. Oterwse, cx! cx and ts contradcts te FG decson rule. Let te last event e n CS tat satsfes e! c x be e 0 on p. Suc an event always exsts because s(m 1 )! c x.if s(m 1) s after c x, c x! c x and ts contradcts te FG decson rule. Let e = cp x (), tat s, let e be p s last event nown to p at c x. From te defnton, e0! e. (Case 3-1: e 0 s receve event r(m)) From te assumpton, te next send event n CS s after e. Tere s a causal

4 sequence from e to c x. Let r(m0 ) be te last receve event n te causal sequence. Snce c () = x 0 1 and c () <x at e, cr (; ) =true and cr (; ) =false at r(m 0 ). Tus, p must ave taen te x -t cecpont before r(m 0 ) from Rule F. (Case 3-: e 0 s send event s(m)) Let te recever of M be p g and let e g = cp x (g). From te assumpton, r(m) s after e g. ad (g; ; ) = true, cr (g; ) = false, and ad (g; ; ) =false are satsfed at r(m 0 ) snce c g () < x 01, c g () <x at e g and c g ()=x 01, c g () <x at r(m). Tus, p must ave taen te x -t cecpont before r(m 0 ) from Rule F. Te nformaton pggybaced on eac message and ept n eac process s O(n) nteger and O(n 3 ) boolean values. 4 Algortm LA for LG c Consder te case wen p realzes p s ntaton c x at receve event cf x (). Let te message be m and ts sender be p. Cecpontng algortm A sets LG x (E(A);) as p s newest cecpont or taes a new addtonal cecpont before r(m) and sets LG x (E(A);) as te new one. In eter case, LG x (E(A);) s te last cecpont tat s not after cf x (). LA must decde weter t taes a new addtonal cecpont before r(m) n order to mae LG x consstent wt te mnmum number of addtonal cecponts. Assume tat p as taen (x 01) cecponts before te arrval of m. Te cases wen te x -t cecpont must be taen before r(m) are sown n Fg. 5. Te frst case s wen tere s a cecpont c x suc tat cx01! c x and cx! r(m) are satsfed. Tere s an ntaton c x tat satsfes LGx ()= c x. LGx s not consstent f cx s not taen before r(m) because c x01! c x. Tus, an addtonal cecpont s necessary. Ts condton s represented as follows. Consder a varable see (). see () =true f p nows a cecpont c tat satsfes c x! c for p s current cecpont c x. (Rule L1) see ()=true. Te second case s wen p sends a message m 0 to process p after c x 01 and neter LG x () nor LG x () as been decded. Ts addtonal cecpont s necessary f p sends message m 00 to p after r(m) and p executes r(m 0 ), taes a cecpont c x, and ten executes r(m00 ). Now, snce cf x () = r(m 00 ), LG x () s c x or an addtonal cecpont tat s taen ust before r(m 00 ). In eter case, c x01! LG x () and LG x s not consstent f LG x () =x 0 1. Terefore, p must tae an addtonal cecpont before r(m). Ts case s represented as follows. Varable num ()= x f p nows te newest ntaton by p s c x. Varable dc (; )=true f p nows tat p as decded te element of LG x (), were x = num (). Varable st () =true f p as sent a message to p after p s latest (te c ()-t) cecpont. (Rule L) dc (; ) = false, dc (; ) = false, and st ()=true for some par of (; ). Algortm LA, wc ncludes te rule for updatng tese varables, s sown n Fg. 6. LG x () s stored n varable lg. lg (; x )=yf LG x () =c y. Note tat lg (; x ) mgt be undefned for two reasons. Frst, p does not now ntaton c x x, tat s, cf ()=> at a gven state. In suc a case, LG x ()=>. Te second case s wen cf x ()= cf x0 (), tat s, te nformaton for two dfferent ntatons by p arrves at p at te same tme. Te nformaton about old ntatons s dscarded because LG x () = LG x0 (). Tus, f lg (; x) s undefned for every x(x 0 <x<x ) and lg (; x ) s defned, lg (; x) = lg (; x ) for any ntaton c x (x 0 <x<x ). Teorem 3 Every addtonal cecpont taen by LA s necessary. Teorem 3 s obvous from te above dscusson. Lemma 1 [7] If a global cecpont (c 1 ;c ;:::;c n ) s not consstent, tere s a par (c ;c ) suc tat tere s a causal sequence from c to c wose lengt s 1. Teorem 4 LG x (E(LA)) s consstent for any cecpont ntaton c x. (Proof) Assume tat LG x s not consstent. From Lemma 1, assume tat c x (= LG x ())! c x (= LG x ()) and let te message n te causal sequence be m. Let e x be te event wen p decdes LG x (). Note tat LG x () mgt be decded by decdng LG x0 () for x 0 > x as descrbed above. In suc a case, e x = e x0. e x s an ntaton, a receve event, or > (n ts case, LG x () = > ). If e x s a receve event, LG x () s before e x. In te oter cases, ex = LG x (). Tus, LG x ()! e x s satsfed. Note tat LG x () s p s newest cecpont at e x. num () <x s satsfed before e x and num () x s satsfed after e x c x. 6= > snce tere s an event s(m) after c x (Case 1: e x! e x ) Snce cx s p s newest cecpont at e x and cx! cx! e x! e x, see ()=true at e x. Tus, c x must be te newly taen cecpont ust before e x from Rule L1. Ts contradcts te noton tat tere s an event s(m) between c x and ex. (Case : e x s before s(m)) num () x must be satsfed at r(m). Tus, e x must be equal to or before r(m). Ts contradcts te noton tat c x s after r(m). (Case 3: e x 6! e x and ex s after s(m)) Snce ex 6! e x, dc (; )=false at e x. Snce tere s an event s(m) between c x and ex, ex s a receve event. Let X = num () at e x. X x s satsfed. Snce st ()=true.

5 and dc (; )=false at e x, cx must be te newly taen cecpont ust before e x from Rule L. Ts contradcts te noton tat tere s an event s(m) between c x and ex. Te nformaton pggybaced on eac message and ept n eac process (oter tan te output) s O(n) nteger and O(n ) boolean values. Here, te rule for removng old cecponts s sown. Te amount of stable storage usage becomes large f old cecponts are not removed. Assume tat p rolls bac to te newest ntaton by p. p mgt be forced to roll bac to lg (; num()). Tus, p does not need te cecponts before mn lg (; num()) and tese cecponts can be removed. 5 Concluson Ts paper sowed two dstrbuted algortms tat mae te frst and last global cecpont consstent wt a mnmum number of addtonal cecponts taen n eac process. Remanng problems nclude reducng te amount of nformaton used by te algortms. Acnowledgments Te autor would le to tan Dr. Hrofum Katsuno of NTT for s encouragement and suggestons. References [1] Baldon, R., Helary, J.M., Mostefaou, A., and Raynal, M.: Consstent Cecpontng n Message Passng Dstrbuted Systems, INRIA Tecncal Report No. 564 (June 1995). [] Candy, K.M. and Lamport, L.: Dstrbuted Snapsots: Determnng Global States of Dstrbuted Systems, ACM Transacton on Computer Systems, Vol. 3, No. 1, pp (Feb. 1985). [3] Lamport, L.: Tme, Clocs, and te Orderng of Events n a Dstrbuted System, Communcatons of ACM, Vol. 1, No. 7, pp (July 1978). [4] Manabe, Y. and Imase, M.: Global Condtons n Debuggng Dstrbuted Programs, Journal of Parallel and Dstrbuted Computng, Vol. 15, No. 1, pp (May 199). [5] Manabe, Y.: A Dstrbuted Frst and Last Consstent Global Cecpont Algortm, IPSJ SIG Notes, AL (Oct. 1996). [6] Manabe, Y.: A Dstrbuted Consstent Global Cecpont Algortm wt a Mnmum Number of Cecponts, Tecncal Report of IEICE, COMP97-6 (Apr. 1997). [7] Manabe, Y.: A Dstrbuted Consstent Global Cecpont Algortm wt a Mnmum Number of Cecponts, Proc. of 1t Int. Conf. on Informaton Networng (Jan. 1998). [8] Netzer, R.H. and Xu, J.: Necessary and Suffcent Condtons for Consstent Global Snapsots, IEEE Trans. on Parallel and Dstrbuted Systems, Vol. 6, No., pp (Feb. 1995). [9] Strom, R.E. and Yemn, S.: Optmstc Recovery n Dstrbuted Systems, ACM Trans. on Computer Systems, Vol.3, No.3, pp.04 6 (Aug. 1985). [10] Venates, K., Radarsnan, T., and L, H.F.: Optmal Cecpontng and Local Recordng for Domno-Free Rollbac Recovery, Informaton Processng Letters, Vol. 5, No. 5, pp (July 1987). process p p p p Ý Ý Ý Ý m 1 c 1 m 1 e 1 m 1 c 3 c 1 c 1 4 m 4 3 tme c e c 1 m5 4 m 6 Ý 1 Ý Ý Ý 3 4 : message : cecpont : ntaton Fgure 1. System executon E. c x p m p p p p c x 1 c x r(m) cp r(m) () c x x c c x cp r(m) m r(m) :ntaton or addtonal cecpont :ntaton :addtonal cecpont Fgure. Rule F1. c x 1 m p p p c x 1 cp r(m) () c x x c x c cp r(m) m r(m) Fgure 3. Rule F.

6 program FA; /* program for p.*/ const n = :::; /* number of processes */ var c(n): nteger; n(n), cr(n; n), ad(n; n; n): boolean; procedure cecpont begn tae a cecpont; c() := c()+ 1; n() :=false; for eac (6= ) do cr(; ) :=false; for eac (6= ); do ad(; ; ) :=false; for eac (6= ); do ad(; ; ) :=false; end; /* end of subroutne */ /* man */ ntalzaton begn for eac (6= ) do c() := 01; c() := 0; for eac do n() :=false; for eac (6= );do cr(; ) :=false; for eac do cr(; ) := true; for eac ; ; l do ad(; ; l) :=false; end /* end of ntalzaton */ wen p ntates a cecpont begn cecpont; for eac 6= do n() :=true; end /* end of cecpont ntaton */ wen p sends m to p begn send(m, c, n, cr, ad)top ; for eac do f not(cr(; )) and not(ad(; ; )) ten for eac do ad(; ; ) :=true; end /* end of message sendng */ wen message (m, mc, mn, mcr, mad) arrves from p begn for eac do begn f c() < mc() ten begn n() := mn(); for eac (6= ) do cr(; ) := mcr(; ); for eac (6= );ldo f mc(l) c(l) ten ad(; ; l) := mad(; ; l) else ad(; ; l) :=false; end /* end of case c() < mc() */ else f c()=mc() ten begn n() := n() _ mn(); for eac (6= ) do cr(; ) := cr(; ) _ mcr(; ); for eac (6= );ldo f mc(l) >c(l) ten f ad(; ; ) ten ad(; ; l) :=false else ad(; ; l) := mad(; ; l) else f mc(l)=c(l) ten f (cr(; l) or mcr(,l) or (ad(; ; ) and not(ad(; ; l))) or (mad(; ; ) and not(mad(; ; l))) ten ad(; ; l) :=false else ad(; ; l) := ad(; ; l) _ mad(; ; l) else /* mc(l) <c(l) */ f mad(; ; ) ten ad(; ; l) :=false; end /* end of case c()=mc() */ else /* c() > mc() */ for eac (6= );ldo f mc(l) >c(l) ten ad(; ; l) :=false end; /* end of f statement */ end; /* end of loop by. */ for eac (6= ) do c() := max(c(); mc()); f n() or 9(; ), ((cr(; ) and not(cr(; ))) or (ad(; ; ) and not(cr(; )) and not(ad(; ; )))) ten cecpont; execute r(m); end /* end of message arrval */ Fgure 4. Algortm FA. c x LG x p p c x m p c x 1 c x r(m) p p p x c c x 1 c x m c x x LG m r(m) m" Fgure 5. Rule L1 and L. program LA; /* program for p.*/ const n = :::; /* number of processes */ var c(n), num(n), lg(n; 3): nteger; dc(n; n), see(n), st(n): boolean; procedure cecpont begn tae a cecpont; c() := c()+ 1; for eac do st() :=false; for eac (6= ) do see() :=true; see() :=false end; /* end of subroutne */ /* man */ ntalzaton begn for eac 6= do c() := 01; c() := 0; for eac do num() := 0; for eac ; do dc(; ) :=true; for eac do see() :=false; for eac do st() :=false; end /* end of ntalzaton */ wen p ntates a cecpont begn cecpont; num() := c(); for eac (6= ) do dc(; ) :=false; end /* end of cecpont ntaton */ wen p sends m to p begn send(m, c, num, see, dc) top ; st() :=true; end /* end of message sendng */ wen message (m, mc, mnum, msee, mdc) arrves from p begn for eac do begn f num() < mnum() ten for eac do dc(; ) := mdc(; ); else f num()=mnum() ten for eac do dc(; ) := dc(; ) _ mdc(; ); end /* end of loop by */ for eac do num() := max(num(); mnum()); for eac do f c() < mc() ten see() := msee() else f c()=mc() ten see() := see() _ msee(); for eac do c() := max(c(); mc()); f see() or 9(; ), (not(dc(; )) and not(dc(; )) and st()) ten cecpont; for eac do f not(dc(; )) ten begn dc(; ) :=true; lg(; num()) := c(); end; execute r(m); end /* end of message arrval */ Fgure 6. Algortm LA.

Machine Learning. K-means Algorithm

Machine Learning. K-means Algorithm Macne Learnng CS 6375 --- Sprng 2015 Gaussan Mture Model GMM pectaton Mamzaton M Acknowledgement: some sldes adopted from Crstoper Bsop Vncent Ng. 1 K-means Algortm Specal case of M Goal: represent a data

More information

Priority queues and heaps Professors Clark F. Olson and Carol Zander

Priority queues and heaps Professors Clark F. Olson and Carol Zander Prorty queues and eaps Professors Clark F. Olson and Carol Zander Prorty queues A common abstract data type (ADT) n computer scence s te prorty queue. As you mgt expect from te name, eac tem n te prorty

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

The AVL Balance Condition. CSE 326: Data Structures. AVL Trees. The AVL Tree Data Structure. Is this an AVL Tree? Height of an AVL Tree

The AVL Balance Condition. CSE 326: Data Structures. AVL Trees. The AVL Tree Data Structure. Is this an AVL Tree? Height of an AVL Tree CSE : Data Structures AL Trees Neva Cernavsy Summer Te AL Balance Condton AL balance property: Left and rgt subtrees of every node ave egts dfferng by at most Ensures small dept ll prove ts by sowng tat

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

Investigations of Topology and Shape of Multi-material Optimum Design of Structures

Investigations of Topology and Shape of Multi-material Optimum Design of Structures Advanced Scence and Tecnology Letters Vol.141 (GST 2016), pp.241-245 ttp://dx.do.org/10.14257/astl.2016.141.52 Investgatons of Topology and Sape of Mult-materal Optmum Desgn of Structures Quoc Hoan Doan

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES

A SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES A SYSOLIC APPROACH O LOOP PARIIONING AND MAPPING INO FIXED SIZE DISRIBUED MEMORY ARCHIECURES Ioanns Drosts, Nektaros Kozrs, George Papakonstantnou and Panayots sanakas Natonal echncal Unversty of Athens

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

An Analytical Tool to Assess Readiness of Existing Networks for Deploying IP Telephony

An Analytical Tool to Assess Readiness of Existing Networks for Deploying IP Telephony An Analytcal Tool to Assess Readness of Exstng Networks for Deployng IP Telepony K. Sala M. Almasar Department of Informaton and Computer Scence Kng Fad Unversty of Petroleum and Mnerals Daran 31261, Saud

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

A Polylog Time Wait-Free Construction for Closed Objects

A Polylog Time Wait-Free Construction for Closed Objects A Polylog Tme Wat-Free Constructon for Closed Obects Tusar Deepak Candra Prasad Jayant Kng Tan IBM T.J.Watson Researc Center Dartmout College Dartmout College tusar@watson.bm.com prasad@cs.dartmout.edu

More information

Mode-seeking by Medoidshifts

Mode-seeking by Medoidshifts Mode-seekng by Medodsfts Yaser Ajmal Sek Robotcs Insttute Carnege Mellon Unversty yaser@cs.cmu.edu Erum Arf Kan Department of Computer Scence Unversty of Central Florda ekan@cs.ucf.edu Takeo Kanade Robotcs

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Information Sciences

Information Sciences Informaton Scences 79 (9) 369 367 ontents lsts avalable at ScenceDrect Informaton Scences ournal homepage: www.elsever.com/locate/ns Necessary and suffcent condtons for transacton-consstent global checkponts

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -

More information

TF 2 P-growth: An Efficient Algorithm for Mining Frequent Patterns without any Thresholds

TF 2 P-growth: An Efficient Algorithm for Mining Frequent Patterns without any Thresholds TF 2 P-growth: An Effcent Algorthm for Mnng Frequent Patterns wthout any Thresholds Yu HIRATE, Ego IWAHASHI, and Hayato YAMANA Graduate School of Scence and Engneerng, Waseda Unversty {hrate, ego, yamana}@yama.nfo.waseda.ac.jp

More information

Pass by Reference vs. Pass by Value

Pass by Reference vs. Pass by Value Pass by Reference vs. Pass by Value Most methods are passed arguments when they are called. An argument may be a constant or a varable. For example, n the expresson Math.sqrt(33) the constant 33 s passed

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

Lecture 5: Probability Distributions. Random Variables

Lecture 5: Probability Distributions. Random Variables Lecture 5: Probablty Dstrbutons Random Varables Probablty Dstrbutons Dscrete Random Varables Contnuous Random Varables and ther Dstrbutons Dscrete Jont Dstrbutons Contnuous Jont Dstrbutons Independent

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

IPP-HURRAY! Research Group. Polytechnic Institute of Porto School of Engineering (ISEP-IPP)

IPP-HURRAY! Research Group. Polytechnic Institute of Porto School of Engineering (ISEP-IPP) IPP-HURRAY! Researc Group Polytecnc Insttute of Porto Scool of Engneerng (ISEP-IPP) Desgnng Real-Tme Systems Based on Mono-Master Profbus-DP Networks r Salvatore MONFORTE Máro ALVES Francsco VASQUES (FEUP)

More information

UNIT 2 : INEQUALITIES AND CONVEX SETS

UNIT 2 : INEQUALITIES AND CONVEX SETS UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces

More information

The ray density estimation of a CT system by a supervised learning algorithm

The ray density estimation of a CT system by a supervised learning algorithm Te ray densty estaton of a CT syste by a suervsed learnng algort Nae : Jongduk Baek Student ID : 5459 Toc y toc s to fnd te ray densty of a new CT syste by usng te learnng algort Background Snce te develoent

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Ramsey numbers of cubes versus cliques

Ramsey numbers of cubes versus cliques Ramsey numbers of cubes versus clques Davd Conlon Jacob Fox Choongbum Lee Benny Sudakov Abstract The cube graph Q n s the skeleton of the n-dmensonal cube. It s an n-regular graph on 2 n vertces. The Ramsey

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Lecture 4: Principal components

Lecture 4: Principal components /3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

KFUPM. SE301: Numerical Methods Topic 8 Ordinary Differential Equations (ODEs) Lecture (Term 101) Section 04. Read

KFUPM. SE301: Numerical Methods Topic 8 Ordinary Differential Equations (ODEs) Lecture (Term 101) Section 04. Read SE3: Numercal Metods Topc 8 Ordnar Dfferental Equatons ODEs Lecture 8-36 KFUPM Term Secton 4 Read 5.-5.4 6-7- C ISE3_Topc8L Outlne of Topc 8 Lesson : Introducton to ODEs Lesson : Talor seres metods Lesson

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

Exact solution, the Direct Linear Transfo. ct solution, the Direct Linear Transform

Exact solution, the Direct Linear Transfo. ct solution, the Direct Linear Transform Estmaton Basc questons We are gong to be nterested of solvng e.g. te followng estmaton problems: D omograpy. Gven a pont set n P and crespondng ponts n P, fnd te omograpy suc tat ( ) =. Camera projecton.

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

Test Generation for Acyclic Sequential Circuits with Hold Registers

Test Generation for Acyclic Sequential Circuits with Hold Registers Test Generation for Acyclic Sequential Circuits wit Hold Registers Tomoo Inoue, Debes Kumar Das, Ciio Sano, Takairo Miara, and Hideo Fujiwara Faculty of Information Sciences Computer Science and Engineering

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

1 Dynamic Connectivity

1 Dynamic Connectivity 15-850: Advanced Algorthms CMU, Sprng 2017 Lecture #3: Dynamc Graph Connectvty algorthms 01/30/17 Lecturer: Anupam Gupta Scrbe: Hu Han Chn, Jacob Imola Dynamc graph algorthms s the study of standard graph

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

Secure Index Coding: Existence and Construction

Secure Index Coding: Existence and Construction Secure Index Codng: Exstence and Constructon Lawrence Ong 1, Badr N. Vellamb 2, Phee Lep Yeoh 3, Jörg Klewer 2, and Jnhong Yuan 4 1 The Unversty of Newcastle, Australa; 2 New Jersey Insttute of Technology,

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Lecture #5.3 Mirrors

Lecture #5.3 Mirrors Lecture #5.3 Mrrrs We ave already dscussed reflectn f EM waves. Ts penmenn fnds useful applcatn n te devces we use n ur everyday lfe. Tday we sall talk abut w reflectn wrks n rder t prduce mages n dfferent

More information

Simultaneous Gate Sizing and Fanout Optimization

Simultaneous Gate Sizing and Fanout Optimization Smultaneous Gate Szng and Fanout Optmzaton We Cen *, Ceng-Ta Hse +, Massoud Pedram * * Unversty of Soutern Calforna + VerplexSystems,Inc. Los Angeles, CA 90089 Mlptas, CA 95035 Abstract Ts paper descrbes

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Strategies for Improving the Quality of Polling Service in

Strategies for Improving the Quality of Polling Service in CSCC 2017 Strateges for Improvng te Qualty of Pollng Servce n Wreless Metropoltan Area etwork Z-Jun Yan g 1, 2, Yang Su 1,*, Hong-We Dng 1 and Yang-Yang Dng 1 1 Scool of Informaton Scence and Engneerng,

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

such that is accepted of states in , where Finite Automata Lecture 2-1: Regular Languages be an FA. A string is the transition function,

such that is accepted of states in , where Finite Automata Lecture 2-1: Regular Languages be an FA. A string is the transition function, * Lecture - Regular Languages S Lecture - Fnte Automata where A fnte automaton s a -tuple s a fnte set called the states s a fnte set called the alphabet s the transton functon s the ntal state s the set

More information

SUV Color Space & Filtering. Computer Vision I. CSE252A Lecture 9. Announcement. HW2 posted If microphone goes out, let me know

SUV Color Space & Filtering. Computer Vision I. CSE252A Lecture 9. Announcement. HW2 posted If microphone goes out, let me know SUV Color Space & Flterng CSE5A Lecture 9 Announceent HW posted f cropone goes out let e now Uncalbrated Potoetrc Stereo Taeaways For calbrated potoetrc stereo we estated te n by 3 atrx B of surface norals

More information

Loop-Free Multipath Routing Using Generalized Diffusing Computations

Loop-Free Multipath Routing Using Generalized Diffusing Computations 1 Loop-Free Multpath Routng Usng Generalzed Dffusng Computatons Wllam T. Zaumen J.J. Garca-Luna-Aceves Sun Mcrosystems, Inc. Computer Engneerng Department 901 San Antono Avenue School of Engneerng Palo

More information

IP mobility support is becoming very important as the

IP mobility support is becoming very important as the 706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Midpoint routing algorithms for Delaunay triangulations

Midpoint routing algorithms for Delaunay triangulations See dscussons, stats, and author profles for ths publcaton at: https://www.researchgate.net/publcaton/224140686 Mdpont routng algorthms for Delaunay trangulatons CONFERENCE PAPER MAY 2010 DOI: 10.1109/IPDPS.2010.5470471

More information

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin. 1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation

More information

On Correctness of Nonserializable Executions

On Correctness of Nonserializable Executions Journal of Computer and System Scences 56, 688 (1998) Artcle No. SS971536 On Correctness of Nonseralzable Executons Rajeev Rastog,* Sharad Mehrotra, - Yur Bretbart, [,1 Henry F. Korth,* and Av Slberschatz*

More information

Report on On-line Graph Coloring

Report on On-line Graph Coloring 2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm

More information

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree.

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree. Data Structures CSC212 1 AVL Trees A binary tree is a eigt-balanced-p-tree if for eac node in te tree, te difference in eigt of its two subtrees is at te most p. AVL tree is a BST tat is eigt-balanced-tree.

More information

Mathematical Analysis of IEEE Energy Efficiency

Mathematical Analysis of IEEE Energy Efficiency Matematcal Analyss of IEEE 02.11 Energy Effcency e-mal: Andrea Zanella and Francesco De Pellegrn Dpartmento d Ingegnera dell Informazone nverstà d Padova va Gradengo /b 35121 Padova Italy andrea.zanellafrancesco.depellegrn

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

arxiv: v1 [cs.pf] 1 Oct 2016

arxiv: v1 [cs.pf] 1 Oct 2016 Data-Unt-Sze Dstrbuton Model wt Retransmtted Packet Sze Preservaton Property and Its Applcaton to Goodput Analyss for Stop-and-Wat Protocol: Case of Independent Packet Losses Takas Ikegawa Abstract arxv:1610.00149v1

More information

Cell Count Method on a Network with SANET

Cell Count Method on a Network with SANET CSIS Dscusson Paper No.59 Cell Count Method on a Network wth SANET Atsuyuk Okabe* and Shno Shode** Center for Spatal Informaton Scence, Unversty of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-8656, Japan

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Rational Interpolants with Tension Parameters

Rational Interpolants with Tension Parameters Ratonal Interpolants wt Tenson Parameters Gulo Cascola and Luca Roman Abstract. In ts paper we present a NURBS verson of te ratonal nterpolatng splne wt tenson ntroduced n [2], and we extend our proposal

More information