QMDD and Spectral Transformation of Binary and Multiple-Valued Functions *

Size: px
Start display at page:

Download "QMDD and Spectral Transformation of Binary and Multiple-Valued Functions *"

Transcription

1 QMDD ad Spectral Trasformatio of Biary ad Multiple-Valued Fuctios * D. Michael Miller Uiversity of Victoria Victoria, BC, Caada mmiller@uvic.ca Mitchell A. Thorto Souther Methodist Uiversity Dallas, TX, USA mitch@egr.smu.edu Abstract The use of decisio diagrams (DD) for the computatio ad represetatio of biary fuctio spectra has bee well studied [2,3,5]. Computatios ad represetatio of spectra for multiplevalued logic (MVL) fuctios have also bee cosidered [6]. For biary fuctios, this approach ca be implemeted usig oe of a umber of the highly efficiet publicly available biary decisio diagram (BDD) packages, e.g. CUDD [3]. Work with MVL fuctios requires a package suited to the MVL case, e.g. [7,8]. Quatum multiple-valued decisio diagrams (QMDD) were itroduced i [9-2] as a meas to represet ad maipulate the matrices required for biary or multiple-valued reversible ad quatum gates ad circuits. I this paper, we show how QMDD ca also be applied to the computatio of spectral trasformatios of biary ad multiple-valued fuctios. A major motivatio for this work is that it itroduces a approach to the spectral aalysis of reversible ad quatum circuits i a represetatio that is applicable to simulatio ad sythesis of such circuits. It is also of iterest i that it is a cosistet approach for a variety of trasformatios of biary ad multiple-valued fuctios.. Spectral Trasformatio We oly cosider issues here that are ivolved i computig spectral trasformatios ad ot the reasos for doig so or how spectral represetatios assist i aalysis ad sythesis problems. The reader iterested i those matters should cosult the literature, e.g. [4,4]. It is also importat to ote that we oly show three represetative spectral trasformatios. The approach is directly applicable to may other trasformatios foud i the literature. Cosider a biary or MVL -variable fuctio represeted by a truth colum vector F. We are iterested i spectral trasformatios defied as i eq. where T is a r! r trasformatio matrix ad r is the radix of the fuctio. The trasformatio matrices of iterest are defied by the Kroecker product show i eq. 2 where T is a r! r base matrix defiig the trasformatio. S " T F () T i" "# T (2) Rademacher-Walsh: Reed-Muller: Chresteso: $ % T " ( ) * $ % T " ) * $ % ( 2+ i 2 T " a a, a e r ", r " 3 2 ) a a * (3a) (3b) (3c) * This research was supported i part by a Discovery Grat from the Natural Scieces ad Egieerig Research Coucil of Caada.

2 Eq. 3 shows three well studied trasformatios. The Rademacher-Walsh trasformatio is computed over the itegers; the Reed-Muller trasformatio is computed over GF(2); ad the Chresteso trasformatio is computed over the complex umbers. The Chresteso trasform show i eq. 3c is for the case r=3. It is readily exteded to higher values of r ad reduces to the Rademacher-Walsh case for r=2. For the Rademacher-Walsh case, the fuctio vector F may be i (,) or (+,-) codig [4]. It is always (,) for the Reed-Muller case where the computatio is doe over GF(2). I the Chresteso case, F is coded with logic value p,, p - r, represeted by a p. 2. Spectral Trasformatio Computatio Computatio of a spectral trasformatio by matrix multiplicatio as per eq. requires r! r multiplicatios ad r!( r ( ) additios so the complexity is O(r 2 ). This becomes impractical for of ay sigificat. Fast trasform techiques aalogous to the fast discrete Fourier trasform are well kow [4] ad are much more efficiet tha direct matrix multiplicatio. For example, Fig. shows a C program implemetig a fast Rademacher-Walsh trasform for biary fuctios. The complexity ca be see from this code to be O ( 2 ) where is the umber of fuctio variables. void fht(it f[], it ) { it i,j,k,t,m,p; for (m=;m<(<<);m=m<<) { for (i=;i<(<<);i+=m<<) { for (j=i,p=k=i+m;j<p;j++,k++) { t=f[j]; // lie a f[j]=(f[j]+f[k]); // lie b f[k]=(t-f[k]); // lie c } } } } Figure : Fast biary Rademacher-Walsh Trasform. The approach illustrated i Fig. ca be adapted to other trasforms. For example, the Reed- Muller trasform is implemeted by replacig lies a, b ad c by the sigle assigmet f[k]=(f[j] +f[k]) where is implemetig the mod-2 operatio (this is more efficiet tha %2). While fast trasform techiques are much more efficiet tha direct matrix multiplicatio, they share a major drawback i that the iitial truth vector ad the resultig spectrum are vectors of legth r. Not oly ca such a vector be of prohibitive, a vector represetatio does ot idetify or exploit ay structure that might be iheret i the spectrum. The use of DD techiques for computig spectral trasformatios has bee studied for both biary ad MVL fuctios. As oted above, this work has bee somewhat separate sice differet DD packages have bee used for the biary ad MVL situatios. The approach described below is uified i that it employs the QMDD package as described i [9-2] for all cases. Relatively mior extesios are required icludig the use of modular arithmetic for the Reed-Muller trasform. The advatages of DD approaches, icludig the approach described below, lie i the fact that the of the DD represetig the origial fuctio ad the spectrum is ot fixed ad i fact exploits the structure that might be preset i each. This has space implicatios ad ca directly affect the complexity of computig a trasformatio. Just as importat, the DD represetig a spectrum ofte makes the uderlyig structure of the spectrum apparet. 3. Quatum Multiple-valued Decisio Diagrams We assume the reader is familiar with the fudametals of DD techiques [,4]. As oted above, we are i geeral cocered with trasformatio matrices of dimesio r! r where r is the radix ad is the umber of variables. Such a matrix ca be partitioed as show i the followig equatio:

3 $ M M! M r( % M r M r M. 2r( M! " " " # " M M! M ) r ( r r ( r. r ( * (4) ( (. where each M i is a matrix of dimesio r! r Each of the M i ca be similarly partitioed ad the process repeated util scalars are reached. This repeated partitioig leads to the fudametal QMDD structure. Defiitio : A quatum multiple-valued decisio diagram (QMDD) is a directed acyclic graph with the followig properties:. There is a sigle termial vertex with associated value ad o outgoig edges. 2. There are some umber of o-termial vertices each labeled by a r 2 -valued selectio variable. Each o-termial vertex has r 2 outgoig edges desigated e, e,..., e 2 (. r 3. Oe vertex is the start vertex ad has a sigle icomig edge that itself has o source vertex. 4. Every edge i the QMDD, icludig the oe leadig to the start vertex, has a associated complex-valued weight. A edge with weight of must poit to the termial vertex. 5. The selectio variables are ordered (assume with o loss of geerality the orderig x $ x $%$ x ( ) ad the QMDD satisfies the followig two rules: i) Each selectio variable appears at most oce o each path from the start vertex to the termial vertex. ii) A edge from a o-termial vertex labeled x i poits to a o-termial vertex labeled x j, j < i or to the termial vertex. Hece x is closest to the termial ad x - labels the start vertex. 6. No o-termial vertex is redudat, i.e. o o-termial vertex has its r 2 outgoig edges all with the same weight ad poitig to a commo vertex Each otermial ode is ormalized such that for some j, e,, j, r (, has weight ad all ei, i - j, have weight. Note, such a j must exist or the vertex would be redudat (all weights ). 8. No-termial vertices are uique, i.e. o two o-termial vertices labeled by the same x i ca have the same set of outgoig edges (destiatios ad weights). As is commo for DD represetatios, a key property of QMDD is that the represetatio for ay give matrix is uique. A proof is available from the authors. A key feature of this proof is the ormalizatio process that is applied durig the costructio of a QMDD. The ormalizatio rule used here is as itroduced i [9]. This ormalizatio procedure extracts commo multiplicative factors as each vertex is created ad thus extracts commo factors for each subgraph of the QMDD ad the QMDD itself. Skipped variables (see Def. 2) must be cosidered i DD based algorithms. Defiitio 2: Give the orderig x $ x $%$ x ( a edge from a vertex labeled xi, i /, skips a variable, or variables, if it poits to the termial vertex or it poits to a vertex labeled x, j - i (. For reversible circuits, skipped variables oly appear whe a edge has weight ad poits to the termial vertex. However, this is ot the case for circuits composed of geeral quatum gates. Skipped variables also occur whe QMDD are used for spectral trasformatio ad must be take ito accout as described i the ext sectio. 4. QMDD-Based Spectral Trasformatio Fig. 2 shows the QMDD represetatio for the 3-variable Rademacher-Walsh trasform matrix. Note that the umbers o the edges are multiplicative weights ad do ot idicate variable value idetificatios as is usually the case for DD figures. The edges values represet trasformatio matrix quadrats,, 2, ad 3 from left to right out of each vertex. The QMDD has a sigle vertex for each variable ad thus grows liearly as icreases. This is a importat property which is true for ay trasformatio matrix defied as show i eq. 2 ad is particularly importat with regard to efficiecy i spectral computatios. j j

4 x 2 x 2 - x x x - x - x Figure 2: QMDD for 3-variable Rademacher- Walsh trasform matrix. Figure 3: QMDD for 3-variable majority fuctio. QMDD were developed for represetig ad maipulatig r! r matrices. To apply QMDD to the spectral trasform computatio problem requires a represetatio for colum vectors. Rather tha itroducig a separate structure, we adapt the QMDD structure. I particular, a colum vector ca be cosidered to be a matrix with empty submatrices which ca be represeted by ull poiters i the QMDD structures. This is illustrated i Eq. 5 where deotes a empty submatrix. $ V! % Vr V! " (5) " " # " V 2 )! r ( r * This structure is repeatedly applied as the QMDD is formed. For example, the QMDD i Fig. 3, represets the colum vector for the 3-variable majority fuctio. The QMDD structure is similar to may DD structures the reader will be familiar with. However, we ote each ode has multiple outgoig edges (ot two as i a BDD), that the umbers o the edges are multipliers, ad there is a sigle termial vertex. The diagram i Fig. 3 is i effect a BDD but agai ote that the use of weighted edges is differet from BDD. Our QMDD-based spectral trasformatio method ivolves implemetig the multiplicatio of a matrix ad colum vector represeted as a QMDD resultig i a colum vector. The implemetatio is modeled upo Bryat s APPLY algorithm for BDD [], ad is based o the fact that matrix multiplicatio ca be decomposed as show i eq. 6. The required QMDD matrix additio is also discussed i [9] ad is agai based o Bryat s APPLY. $ A A! Ar( % $ B B! Br( % Ar Ar A 2r Br Br B.! (.! 2r(! " " # " " " # " ) A A! A B B B r ( r r ( r. r ( * )! r ( r r ( r. r ( * (6) $ A B. A Br.... Ar ( B 2 A B. A Br... Ar B 2 r ( r... (! " r ( r. % Ar B. Ar. Br.... A2 r( B 2 "! " r ( r " " " # " A 2 Br A 2 B )!!! r r (. r r r(.. A B ( (. r ( r ( * Three issues must be cosidered whe maipulatig colum vectors represeted as QMDD. First, ull poiters must be take ito accout. I multiplicatio, oe of the argumets beig a ull poiter results i a ull poiter i the product. Additio whe a argumet is a ull poiter results i a aswer equal to the other argumet.

5 Secod, QMDD are defied with complex-valued edge weights ad the package thus supports arithmetic operatios o complex values. The Rademacher-Walsh spectrum is computed over the itegers which is ot a issue sice the itegers are a subset of the complex umbers. Reed-Muller trasforms are computed over GF(2) which requires a mior modificatio to the complex value arithmetic packages origially implemeted for QMDD. The third, ad most ivolved issue, is the hadlig of skipped variables. For a matrix, a skipped variable meas the matrix is such that all the submatrices i its decompositio are idetical so the selectio variable ca be skipped. For a colum vector, the iterpretatio is the same but oly for the left-most submatrices the others must be uderstood to be empty. Both situatios are readily take ito accout i the matrix multiplicatio algorithm. The mior complicatio is that a differet iterpretatio is required depedig o whether the QMDD represets a matrix or a colum vector. The iterested reader ca fid details o the implemetatio of the QMDD package i [,] icludig a variety of stadard BDD ad QMDD specific techiques used to ehace the speed of the implemetatio. Much of the speed comes from usig stadard DD compute table techiques as well as computatio tables for cachig the results of complex umber operatios. 5. Experimetal Results The QMDD package is implemeted i C. Extedig it to compute spectral trasforms was relatively straightforward ad ivolved:. Implemetig a routie to build a QMDD give the truth vector for a fuctio. This is a simple recursive costructio. 2. Implemetig a routie to build the QMDD for the required trasformatio matrix. This is a simple iterative routie as a result of the compact liear structure illustrated i Fig Modificatios to the matrix multiplicatio ad additio routies to hadle ull poiters ad geeral skipped variables separately for matrices ad colum vectors. 4. Modificatio to the complex value operatio routies to do computatio over GF(2) whe required for the trasformatio. The results reported are for experimets ru o a Toshiba Protégé laptop with a 75 MHz Petium III ad 52 MB Ram. The Metrowerks compiler V.4 was used with the highest level of global optimizatio. 5. Biary Examples Table shows results for the AND of a icreasig umber of variables. The results show that the QMDD method becomes icreasigly better i terms of umber of operatios as icreases, although it should be oted that the operatios for the QMDD approach are cosiderably more complex. The of the QMDD for the spectrum grows liearly. The space required for the QMDD is iitially much greater tha for the FT spectrum but the relative decreases as icreases ad will cotiue to do so for higher sice while the QMDD is growig liearly, the of the FT vector grows expoetially. Note that each QMDD ode occupies 44 bytes while each FT value is 4 bytes (a simple iteger which is sufficiet up to =3). Tables 2 ad 3 show similar performace for the OR ad the XOR fuctio. This is ot surprisig sice these are highly regular fuctios. Table 4 is similar to the earlier tables but for radomly geerated fuctios. This shows that the QMDD techique is ot very effective for radom fuctios ad geerally requires more storage tha the fast trasform approach. This is ot uexpected sice QMDD exploit structure. Table 5 shows a umber of situatios comparig Rademacher-Walsh (+,-) codig (S), Rademacher-Walsh (,) codig (R), ad Reed-Muller (RM) trasform results. The data verifies that, as expected, the RM spectrum is most efficiet i terms of QMDD. For the 2 variable radom fuctio, the user timig routie provided i C showed a executio time of.,.3 ad.2 sec. for the S, RM ad R spectra computatios. The timigs for all other examples were egligible (less tha sec.) It is oteworthy that the performace for the structured fuctios is much better i terms of time ad space for this higher (5) value of. The performace for radom fuctios is improved i terms of umber of operatios but still requires more space tha the FT approach. The results give must be cosidered i the cotext that the QMDD structure ca illumiate the structure of a fuctio spectrum, whereas the FT represetatio is by defiitio flat ad idicates othig directly about structure.

6 5.2 Terary Examples Tables 6, 7 ad 8 show the results for computig the Chresteso spectra for the MIN, MAX ad MOD-SUM fuctios for r=3 for =2,,. The data show is labeled as i the biary case. Note that i this case each QMDD vertex occupies 84 bytes while each FT value, which i this case is a complex value occupies 6 bytes. The performace for these structured fuctios is as expected. The QMDD represetatio gais efficiecy o the FT approach more quickly i the terary case as compared to the biary case. Ad, oce agai, it should be emphad that the QMDD method better represets the uderlyig trasformatio matrix structure. The CPU timigs were agai egligible. 6. Cocludig Remarks We empha that while this paper has used the Rademacher-Walsh, Reed-Muller, ad Chresteso spectral trasformatios for illustratio, the approach is directly applicable to ay trasformatio that ca be expressed as show i eq. with arithmetic over the complex umbers or some subset thereof. It is most efficiet for trasformatios defied as the iterative Kroeker product of a r! r matrix as i Eq. 2 sice that leads to a compact QMDD for the trasformatio matrix. We have implemeted a QMDD-based implemetatio of explicit matrix multiplicatio. It is also possible to implemet a form of fast trasform o a DD but we do ot aticipate that this will lead to a sigificatly faster implemetatio sice the QMDD for the trasformatio matrices are liear ad essetially direct the computatio i effectively the same way a fast implemetatio would. The use of a compute table avoids duplicate computatio. We will however examie this i depth to esure our ituitio is correct. Formal aalysis of the computatioal complexity ad memory use of our approach is ogoig particularly with respect to BDD approaches for the biary case. The aalysis is complicated by the use of compute ad computatio table techiques which are highly fuctio depedet. The examples preseted here are prelimiary. Our ogoig work will ivolve testig the approach o appropriate bechmark fuctios. Also, we have yet to cosider the effect of variable orderig o QMDD i the represetatio of spectra. It is possible, for example, that the radomly geerated results here are very pessimistic ad could be improved through variable reorderig of the QMDD. Refereces [] R.E. Bryat. Graph-Based Algorithms for Boolea Fuctio Maipulatio. IEEE Trasactios o Computers, C-35(8): , 986. [2] E.M. Clarke, K. McMilla, X. Zhao, M. Fujita, ad J. Yag. Spectral Trasforms for Large Boolea Fuctios with Applicatios to Techology Mappig. Formal Methods i System Desig: A Iteratioal Joural, (2-3):37 48, 997. [3] M. Fujita, P.C. McGeer, ad J.C.-Y. Yag. Multi-termial Biary Decisio Diagrams: A Efficiet Data Structure for Matrix Represetatio. Formal Methods i System Desig: A Iteratioal Joural, (2-3):49 69, 997. [4] S. L. Hurst, D.M. Miller ad J.C. Muzio. Spectral Techiques i Digital Logic. Academic Press, New York Lodo, 985. [5] D.M. Miller. Graph Algorithms for the Maipulatio of Boolea Fuctios ad their Spectra. Cogressus Numeratium, 57:77-99, 987. [6] D.M. Miller. Spectral Trasformatio of Multiple-valued Decisio Diagrams. Proc. IEEE Iteratioal Symposium o Multiple-Valued Logic, pp , May 994. [7] D.M. Miller ad R. Drechsler. Implemetig a Multiple-valued Decisio Diagram Package. Proc. IEEE Iteratioal Symposium o Multiple-Valued Logic, pp , 998. [8] D.M. Miller ad R. Drechsler. Augmeted Siftig of Multiple-valued Decisio Diagram. Proc. IEEE Iteratioal Symposium o Multiple-Valued Logic, pages , 23. [9] D.M. Miller ad M.A. Thorto. QMDD: A Decisio Diagram Structure for Reversible ad Quatum Circuits. Proc. IEEE Iteratioal Symposium o Multiple-Valued Logic, 6 p. o CD, 26. [] D.M. Miller, M.A. Thorto, ad D. Goodma. A Decisio Diagram Package for Reversible ad Quatum Circuit Simulatio. Proc. IEEE World Cogress o Computatioal Itelligece, 6 p. o CD, July 26. [] D.M. Miller, D.Y. Feistei ad M.A. Thorto. Variable Reorderig ad Siftig for QMDD. Proc. IEEE Iteratioal Symposium o Multiple-Valued Logic, 7 p. o CD, May 27. [2] D. Michael Miller ad Mitchell A. Thorto. Multiple-Valued Logic: Cocepts ad Represetatios. MorgaClaypool Publishers, 28. [3] F. Somezi. CUDD: CU Decisio Diagram Package vlsi.colorado.edu/~fabio/cudd/cudditro.html. [4] S. N. Yaushkevitch, D.M. Miller, V.P. Shmerko ad R.S. Stakovic, Decisio Diagram Techiques for Micro- ad Naoelectroic Desig, CRC Taylor ad Fracis, 26.

7 Table : Results for AND fuctio Rademacher-Walsh Trasform (+,-) codig. F S Edge Add Mult Total FT Total / (a)qmdd (b)ft (a) / (b) ops FT ops % % % % % % % % % % % % % % Table 2: Results for OR fuctio Rademacher-Walsh Trasform (+,-) codig. F S Edge Add Mult Total FT Total / (a)qmdd (b)ft (a) / (b) ops FT ops % % % % % % % % % % % % % % Table 3: Results for XOR fuctio Rademacher-Walsh Trasform (+,-) codig. F S Edge Add Mult Total FT Total / (a)qmdd (b)ft (a) / (b) ops FT ops % % % % % % % % % % % % % % Table 4: Results for radom fuctios Rademacher-Walsh Trasform (+,-) codig. F S Edge Add Mult Total FT Total / (a)qmdd (b)ft (a) / (b) ops FT ops % % % % % % % % % % % % % % Table Key umber of variables F umber of vertices i QMDD for the fuctio S umber of vertices i QMDD for the spectrum Edge umber of uique edge weights Add umber of add operatios i QMDD trasform Mult umber of multiplicatio operatios i QMDD trasform Total total operatios i QMDD trasform FT ops operatios i fast trasform QMDD of QMDD for spectrum (bytes) FT of spectrum vector for fast trasform (bytes)

8 Table 5: Comparisos for various fuctios ad trasformatios. F S Edge Add Mult Total FT ops (a)qmdd ((b)ft (a) / (b) S AND E+8.% % RM AND E+8.% % R AND E+8.% % S OR E+8.% % Rm OR E+8.% % R OR E+8.% % S XOR E+8.% % RM XOR E+8.% % R XOR E+8.% % S radom % % RM radom % % R radom % % Table 6: Results for MIN fuctio r=3 Chresteso Spectrum. F S Edge Add Mult Total FT ops Total / (a)qmd (b)ft (a) / (b) FT ops D % % % % % % % % % % % % % % % % % % Table 7: Results for MAX fuctio r=3 Chresteso Spectrum. F S Edge Add Mult Total FT ops Total / (a)qmd (b)ft (a) / (b) FT ops D % % % % % % % % % % % % % % % % % % Table 8: Results for MOD-SUM fuctio r=3 Chresteso Spectrum. F S Edge Add Mult Total FT ops Total / (a)qmd (b)ft (a) / (b) FT ops D % % % % % % % % % % % % % %

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

EE123 Digital Signal Processing

EE123 Digital Signal Processing Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms Chapter 4 Sortig 1 Objectives 1. o study ad aalyze time efficiecy of various sortig algorithms 4. 4.7.. o desig, implemet, ad aalyze bubble sort 4.. 3. o desig, implemet, ad aalyze merge sort 4.3. 4. o

More information

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations Iteratioal Coferece o Applied Mathematics, Simulatio ad Modellig (AMSM 2016) Fuzzy Miimal Solutio of Dual Fully Fuzzy Matrix Equatios Dequa Shag1 ad Xiaobi Guo2,* 1 Sciece Courses eachig Departmet, Gasu

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

A graphical view of big-o notation. c*g(n) f(n) f(n) = O(g(n))

A graphical view of big-o notation. c*g(n) f(n) f(n) = O(g(n)) ca see that time required to search/sort grows with size of We How do space/time eeds of program grow with iput size? iput. time: cout umber of operatios as fuctio of iput Executio size operatio Assigmet:

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria.

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria. Computer Sciece Foudatio Exam August, 005 Computer Sciece Sectio A No Calculators! Name: SSN: KEY Solutios ad Gradig Criteria Score: 50 I this sectio of the exam, there are four (4) problems. You must

More information

Towards Compressing Web Graphs

Towards Compressing Web Graphs Towards Compressig Web Graphs Micah Adler Λ Uiversity of Massachusetts, Amherst Michael Mitzemacher y Harvard Uiversity Abstract We cosider the problem of compressig graphs of the lik structure of the

More information

A General Framework for Accurate Statistical Timing Analysis Considering Correlations

A General Framework for Accurate Statistical Timing Analysis Considering Correlations A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Cache-Optimal Methods for Bit-Reversals

Cache-Optimal Methods for Bit-Reversals Proceedigs of the ACM/IEEE Supercomputig Coferece, November 1999, Portlad, Orego, U.S.A. Cache-Optimal Methods for Bit-Reversals Zhao Zhag ad Xiaodog Zhag Departmet of Computer Sciece College of William

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION 397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio

More information

Implementing Dynamic Programming Recurrences in Constraint Handling Rules with Rule Priorities

Implementing Dynamic Programming Recurrences in Constraint Handling Rules with Rule Priorities Implemetig Dyamic Programmig Recurreces i Costrait Hadlig Rules with Rule Priorities Ahmed Magdy 1, Frak Raiser, ad Thom Frühwirth 1 Computer Sciece ad Egieerig, Germa Uiversity i Cairo ahmed.mabrouk@studet.guc.edu.eg

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

Appendix A. Use of Operators in ARPS

Appendix A. Use of Operators in ARPS A Appedix A. Use of Operators i ARPS The methodology for solvig the equatios of hydrodyamics i either differetial or itegral form usig grid-poit techiques (fiite differece, fiite volume, fiite elemet)

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Introduction. Nature-Inspired Computing. Terminology. Problem Types. Constraint Satisfaction Problems - CSP. Free Optimization Problem - FOP

Introduction. Nature-Inspired Computing. Terminology. Problem Types. Constraint Satisfaction Problems - CSP. Free Optimization Problem - FOP Nature-Ispired Computig Hadlig Costraits Dr. Şima Uyar September 2006 Itroductio may practical problems are costraied ot all combiatios of variable values represet valid solutios feasible solutios ifeasible

More information

Numerical Methods Lecture 6 - Curve Fitting Techniques

Numerical Methods Lecture 6 - Curve Fitting Techniques Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

CSE 417: Algorithms and Computational Complexity

CSE 417: Algorithms and Computational Complexity Time CSE 47: Algorithms ad Computatioal Readig assigmet Read Chapter of The ALGORITHM Desig Maual Aalysis & Sortig Autum 00 Paul Beame aalysis Problem size Worst-case complexity: max # steps algorithm

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

prerequisites: 6.046, 6.041/2, ability to do proofs Randomized algorithms: make random choices during run. Main benefits:

prerequisites: 6.046, 6.041/2, ability to do proofs Randomized algorithms: make random choices during run. Main benefits: Itro Admiistrivia. Sigup sheet. prerequisites: 6.046, 6.041/2, ability to do proofs homework weekly (first ext week) collaboratio idepedet homeworks gradig requiremet term project books. questio: scribig?

More information

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

High-Speed Computation of the Kleene Star in Max-Plus Algebra Using a Cell Broadband Engine

High-Speed Computation of the Kleene Star in Max-Plus Algebra Using a Cell Broadband Engine Proceedigs of the 9th WSEAS Iteratioal Coferece o APPLICATIONS of COMPUTER ENGINEERING High-Speed Computatio of the Kleee Star i Max-Plus Algebra Usig a Cell Broadbad Egie HIROYUKI GOTO ad TAKAHIRO ICHIGE

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Ruig Time of a algorithm Ruig Time Upper Bouds Lower Bouds Examples Mathematical facts Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder

More information

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS SIAM J. SCI. COMPUT. Vol. 22, No. 6, pp. 2113 2134 c 21 Society for Idustrial ad Applied Mathematics FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS ZHAO ZHANG AND XIAODONG ZHANG

More information

Theory of Fuzzy Soft Matrix and its Multi Criteria in Decision Making Based on Three Basic t-norm Operators

Theory of Fuzzy Soft Matrix and its Multi Criteria in Decision Making Based on Three Basic t-norm Operators Theory of Fuzzy Soft Matrix ad its Multi Criteria i Decisio Makig Based o Three Basic t-norm Operators Md. Jalilul Islam Modal 1, Dr. Tapa Kumar Roy 2 Research Scholar, Dept. of Mathematics, BESUS, Howrah-711103,

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Priority Queues. Binary Heaps

Priority Queues. Binary Heaps Priority Queues Biary Heaps Priority Queues Priority: some property of a object that allows it to be prioritized with respect to other objects of the same type Mi Priority Queue: homogeeous collectio of

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information