Simulation-Based Test Algorithm Generation and Port Scheduling for Multi-Port Memories

Size: px
Start display at page:

Download "Simulation-Based Test Algorithm Generation and Port Scheduling for Multi-Port Memories"

Transcription

1 imulationbased Test Algoithm Geneation and Pot cheduling fo MultiPot Memoies ChiFeng Wu, ChihTsun Huang, KuoLiang Cheng, ChihWea Wang, and ChengWen Wu Depatment of Electical Engineeing ational Tsing Hua Univesity Hsinchu, Taiwan ABTRACT The pape pesents a simulationbased test algoithm geneation and test scheduling methodology fo multipot memoies. The pupose is to minimize the testing time while keeping the test algoithm in a simple and egula fomat fo easy test geneation, fault diagnosis, and builtin selftest (BIT) cicuit implementation. Conventional functional fault models ae used to geneate tests coveing most defects. In addition, multipot specific defects ae coveed using stuctual fault models. Potscheduling is intoduced to take advantage of the inheent paallelism among diffeent pots. Expeimental esults fo commonly used multipot memoies, including dualpot, foupot, and neadwite memoies, have been obtained, showing that efficient test algoithms can be geneated and scheduled to meet diffeent test bandwidth constaints. Moeove, memoies with moe pots benefit moe with espect to testing time.. ITRODUCTIO Multipot memoies ae commonly used components in VLI systems, such as egiste files in micopocessos, stoage fo media o netwok applications. The content of a multipot memoy can be accessed though diffeent pots simultaneously. This featue is especially valuable fo high speed pocessos, media pocessos, and communication pocessos. Howeve, multipot memoies equie moe testing effot since all pots have to be veified. A multipot memoy is usually tested as seveal singlepot memoies, which ae tested sepaately with test algoithms developed fo single pot memoies. This appoach is simple and easy to deploy, but thee ae two majo poblems with it. The fist is the lack of detection fo multipot specific defects that may occu in the memoy. Multipot memoies need to be veified with moe fault models elated to intepot defects. That makes the complexity of multipot fault models significantly highe than the complexity of singlepot fault models. The second is the inefficiency of the test pocedue, because the inheent paallelism of multipot memoies is not fully utilized duing testing. Test scheduling fo a singlepot memoy is tiv Pemission to make digital o had copies of all o pat of this wok fo pesonal o classoom use is ganted without fee povided that copies ae not made o distibuted fo pofit o commecial advantage and that copies bea this notice and the full citation on the fist page. To copy othewise, to epublish, to post on seves o to edistibute to lists, equies pio specific pemission and/o a fee. DAC 2, June 822, 2, Las Vegas, evada, UA. Copyight 2 ACM //6...$5.. ial, i.e., the entie test algoithm is applied to the one and only pot. When thee ae multiple pots, the test algoithm defines tests fo all pots. Cell faults, such as stuckat faults and tansition faults, ae testable though each one of the pots. On the othe hand, an intepot fault is moe difficult to test than a cell fault because the fault activation needs not only a specific addess, opeation, and data patten, but also a specific pot configuation. Test scheduling is impotant when testing multipot memoies because testing time can be significantly educed by pope test scheduling. Functional fault models and tests fo twopot memoies have been poposed in [, 2], The complexity of the tests is O( m ), whee is the size of the memoy, and m is the numbe of pots []. When the addess scambling scheme is known, the testing time can be educed to O(), but with a lage constant facto, e.g., anging fom 8 to 269 fo twopot memoies [2]. tuctual fault models, such as the adjacent bitline shot, has been used in [3 5]. In geneal, functional fault models coves moe defects, but equie longe testing time than stuctual fault models. tuctual fault models ae based on the cicuit stuctue of the memoy, theefoe deiving tests fo them need moe design infomation. Also, test pattens fo stuctual fault models ae usually not as egula as test pattens fo functional fault models. In this pape, we pesent a methodology that adopts both functional fault models and stuctual fault models. The pupose of ou methodology is to minimize the testing time while keeping the test algoithm in a simple and egula fomat of Mach test fo easy test geneation/scheduling, fault diagnosis, and builtin selftest (BIT) cicuit implementation [6 8]. eveal popula RAM fault models, such as stuckat faults, coupling faults, etc., ae used to cove most memoy defects, while stuctual fault models ae used to cove defects specific to multipot memoies. Pot scheduling is intoduced to futhe optimize the testing time. All test algoithms pesented in this pape have been veified with the the fault simulato that we have developed and constantly impoved, called RAME [9]. 2. FAULT MODEL AD DEFIITIO Fault models ae defined to cove defects in memoy cell aays, addess decodes, and ead/wite cicuits. Functional fault models and Mach algoithms ae widely used in the industy fo this pupose []. eveal popula fault models ae intoduced to demonstate ou methodology, including stuckat fault (AF), tansition fault (TF), addess decode fault (AF), stuckopen fault (OF), ead distubance fault (RDF), and coupling fault (CF), fo which we conside state coupling (CFst), invesion coupling (CFin), and idempotent coupling (CFid). Table shows seveal popula Mach algoithms, following the notation of []. Mach tests ae nomally shot and easy to geneate.

2 Table : ome Mach algoithms. ame Algoithm MAT++ m (); * (;); + (;;) Mach X m (); * (;); + (;); m () Mach Y m (); * (;;); + (;;); m () Mach C m (); * (;); * (;); + (;); + (;); m () FaultFee Faulty Addess α Cell α Pot A Addess α Cell α Addess β Cell β Addess α Cell α Pot B Addess β Cell β Addess β Cell β Figue 3: Functional behavio of an intepot bit line shot. tuctual fault models specific to multipot memoies ae intepot bidge o shot faults, including intepot wod line shots and intepot bit line shots. Figue shows a twopot memoy topology example, in which defects esult in a wod line shot and a bit line shot. The bit lines ae simplified as singleended fo easy eading, but we actually conside diffeential pais and all combinations of shots duing fault simulation. Intepot WL shot 3 2 β Intepot BL shot α γ Figue : Example of twopot memoy layout topology. When an intepot wod line shot occus as in Figue, one of the possible esults is shown in Figue 2. Addess 2 of pot B has a multiple access to Cell 2 and Cell 3 when pot A is accessing Cell. The esulting value of a ead to multiple cells depends on the memoy design: possible faulty esults ae the logicand o logico of the two cells. When an intepot bit line shot occus as in Figue, one of all possible esults is shown in Figue 3. Pot A Addess α has a multiple access to Cell α and Cell β, so has pot B Addess β. The esulting value of a ead to multiple cells depends on the memoy design: possible faulty esults ae the logicand o logico of the two cells. ote that Figue. 2 and 3 descibe possible esults because an intepot shot can lead to moe than one faults on the same bit line o wod line. Pot A Pot B Addess Addess 2 FaultFee Cell Cell 2 Addess Addess 2 Addess 3 Faulty Cell Cell 2 Cell 3 Figue 2: Functional behavio of an intepot wod line shot. Availability of the physical infomation detemines the complexity of intepot faults. When the addess scambling scheme is unknown, all possible ways of shot between all addesses have to be consideed. Fom Figue. 2 and 3, when the physical infomation is missing, the complexity of intepot wod and bit line shots ae O( 3 ) and O( 2 ), espectively, if they ae mapped to functional faults, i.e., addess decode faults. On the othe hand, given the addess scambling data, test algo ithms can be developed to detect most likely shots in the cicuit. The complexity is educed to the ode of the numbe of bit lines and wod lines, i.e., O( 2 ) to O(), depending on the aspect atio of the memoy layout. 3. TET TRATEGY A multipot memoy consists of multiple pots that access the same cell aay with thei own ead/wite cicuits and addess decodes. Applying a Mach test (such as Mach C ) on one pot can detect most defects in the memoy, including the cell aay, the pot s ead/wite cicuit and the pot s addess decode. Ou test stategy is to test the cell aay, ead/wite cicuits and addess decodes using functional fault models that have been welldeveloped fo single pot memoies. Intepot specific defects ae coveed using stuctual fault models. The specification of logical addess fields such as wod line select, bitline select, I/O select, etc., ae equied in ode to deive the addess tanslation. An example of addess tanslation is depicted in Figue 4. Logical Addess Physical Addess A B C D ow A wod line select B I/O select C bit line select D bit position in a wod column Figue 4: cambling. Addess A Data wod A bit3 bit2 bit bit 3 We popose a novel test patten that extends Mach algoithms to test stuctual fault models that involving neighboing cells on physical locations. The neighboing cells, called Mach guads, ae shown in Figue 5. Fo each addess, fou eads ae defined on its neighboing cells, denoted as,, E,and W, espectively. When eaching the bounday, a Mach guad can be eithe degaded to a noopeation (OP) o pushedback to the base (B) cell, depending on the implementation pefeence. The OP can be implemented as a dummy ead, i.e., a ead without compaison with the fault fee value. When degaded to a OP, the detection capability is slightly educed but can be ecoveed by pope potscheduling, which is explained in the next section. The expected value of a Mach guad depends on the addess sequence and the data backgound, as shown in Figue 5. When the addess sequence is ascending and the mach element changes the base cell fom to, the expected value fo and ae and, espectively. One o moe of the fou eads can be used in a Mach algoithm to detect memoy faults. Because of the egulaity of Mach tests, the expected value in ( ; ) o ( W ; E ) ae always complementay except on the bounday, theefoe they povide a good and simple mechanism fo checking line shots fo both ADtype and ORtype shots. Mach guads is an extension to conventional Mach tests. A

3 Mach test with guads fo a twopot memoy is illustated in Figue 6. The test algoithm is executed as a nomal MAT++ [] fo pot A. Two test elements of Mach guads, i.e.,( ; ) and ( W ; E ), ae applied to pot B. Fo pope scheduling of the test elements, a OP (shown as ) is used to match the timing. In M, when pot A executes (;), pot B executes ( ; ) using the same addess sequence, i.e., pot B is checking the adjacent cells. When Mach guads ae employed, ( W ; E ) detects wod line shots, while ( ; ) can detect wod line shots and bit line shots. In Figue, fo example, a ead fom α o β can detect the bit line shot, a ead fom γ can also detect the bit line shot, and a ead fom 2 can detect the wod line shot. In geneal, and ae moe vesatile, but W and E ae still useful fo cetain special conditions, such as boundaies. Thei applications will be demonstated late. W B E / Figue 5: Mach guads. / Append additional tests fo multiplepot specific faults, i.e., addess decode faults (AFs) fo each pot and intepot faults. Thee ae possibilities that these tests equie simultaneous opeations on two o moe ead/wite pots. Consequently, the phase consists of thee sections: the section of a singlepot complete test, the section of AFs, and the section of intepot faults, as shown in Figue 7. To detect multipot specific faults, one o moe Mach guads ae inseted, theefoe two o moe pots may be accessed simultaneously in the test sections 2 and 3, as indicated in the figue. Pot Pot m Mach Test ection ection 2 ection 3 inglepot Test Algoithm Multipot AF Test Intepot Test M M M 2 Pot A m () * (;) + (;;) Pot B ( ) ( ; ) ( W ; E ; ) Figue 6: Mach X with Mach guads extension. Pot Pot m inglepot Test Algoithm Multipot AF Test Intepot MPF Test 4. TET ALGORITHM GEERATIO To geneate test algoithms efficiently fo vaious achitectues of multipot memoies, a systematic methodology is poposed based on TAG, a simulationbased test algoithm geneato fo RAM [6]. Test algoithm geneation with pot scheduling is an extension to TAG, named TAGP. On fault simulation fo multipot memoies, seveal assumptions ae made:. Each memoy pot has a peset access pioity. When accessing an addess simultaneously fom moe than one pots, the opeations ae aanged accoding to the ode of access pioities, fom high to low. Fo simplicity, we assign the pot with the highest access pioity as pot, the next as pot 2, and so on. 2. imultaneous wites to an addess fom multiple pots ae consideed as invalid opeations. 3. Fo neadwite memoies, its wite pot and one of the ead pots ae combined into a ead/wite pai duing the opeation of cell fault detection. The wite pot is assigned pot, without loss of geneality. The test geneation methodology povides automatic test geneation by minimizing the testing time and guaantees the fault coveage. The test geneation algoithm consists of thee phases. The pocedue is stated as follows. An example will be given late fo dualpot memoies.. Base algoithm geneation Geneate a single pot complete test, i.e., a % fault coveage test fo all cell aay faults. The test is pefomed by accessing pot, initially. Figue 7: The complete test Pot scheduling and test eduction. 2. Pot scheduling Each test element in the base algoithm has cetain degee of feedom, i.e., thee may be othe elements that can achieve the same fault detection capability. Pot scheduling is to seach possible compaction ways to educe the testing time. Thepocedueisasfollows. Initial test set contains one o moe base algoithms. Fo each test in the test set, select one that contains all test elements in test sections 2 and 3. (c) each fo appopiate positions whee the selected element matches an element in test section. When the selected element is on pot i and i 6=, the matched element in section can be swapped with the test element in pot i only when it is a OP. A compact test is geneated by embedding the selected test element in test section and deleting it fom its oiginal position. All possible compact tests ae geneated and appended to the test set. (d) imulate each and evey test in the test set with RAM E [9], then delete incomplete tests. Complete tests ae soted by thei test length. A theshold value is set fo keeping additional tests that ae not the shotest test. The default theshold value is, i.e., only the tests with the shotest test length ae kept in the test set, othes ae deleted. (e) Repeat steps 2b to 2d using the new test set until no futhe compaction is possible. Repot the shotest test in the test set as the final test.

4 Test section of the base algoithm consists of test elements fo pot. Thee ae cetain degee of feedom fo test elements in othe test sections to be embedded in section since all pots except pot pefom OPs in section. Moeove, the test elements in pot can be swapped with othe pots with OPs, which inceases the degee of feedom fo futhe compaction. As indicated in Figue 7, the test algoithm is compacted afte the scheduling because the detection capability of test elements in vaious test sections ae ovelapped. The pot scheduling steps will be illustated in the following example. 3. Redundancy check Examine the edundancy among the test fo Mach opeations which pefom ead fo only one pot and pefom OP fo all othe pots, called dangling eads. each fo dangling eads and veify thei edundancy by RAME. Delete edundant opeations. Repeat until no futhe edundancy can be found. The detection capability of a dangling ead is likely to be coveed afte pot scheduling, e.g., the ead opeation fo detecting OF though pot can be emoved because of the insetion of Mach guads. Fo a common dualpot memoy, which has two sepaate ead/wite pots, the test geneation is illustated in Figue 8. Fistly, a 2 test is geneated to cove all AF, TF, OF, RDF, and CFs (see test section of Figue 8). A test fo AFs fo each ead/wite pot is geneated as test section 2, and an intepot specific test is geneated as test section 3. Afte the base algoithm is detemined, the potscheduling is pefomed. ffl Read/wite opeations in test section ae not esticted to the specific pot. The opeation can theefoe be swapped between diffeent pots with the same fault coveage. The pot swapping povides the degee of feedom fo the compaction of multiplepot opeations. Fo example, test section 3 can be diectly matched and embedded in test section, as shown in Figue 8. Test section 2 can only be embedded into test section afte the pot swapping of the two consecutive w opeation, esulting in the algoithm in Figue 8(c). Diffeent odes of compaction steps will alte the esult. In geneal, dealing with the test elements of intepot faults fist obtains bette esult than dealing with the test elements of AFs fist, because the constaints of testing AFs ae less stict and can be dealt with afte the compaction of othe tests. Howeve, all possible odeing can be applied to exploe the seach space fo bette esults. hote tests ae consideed as bette ones. ffl Moeove, some tests such as that fo intepot faults have altenatives. Figue 9 shows two equivalent pattens to detect the intepot shots between pot i and pot j. The pattens also have vaieties fo diffeent access diections o diffeent data backgounds. The vaiations incease the degee of feedom to geneate the final test. A possible patten combination fo all intepot shots is shown in Figue 9. The esult of pot scheduling helps deive altenatives depending on the choice of equivalent tests. Again, an optimized test is selected among diffeent altenatives, accoding to the simulation esults of RAME and the test lengths. Afte pot scheduling, some test elements may still have edundancy because cell aay faults may be coveed by Mach guads. The dangling eads ae examined fo edundancy because emoving the opeation and othe OPs will not affect coect timing. As in Figue 8(c) and (d), thee Mach opeations ae tested and two of them ae stipped. Consequently, a algoithm is geneated fo a dualpot memoy. Pot Pot Pot Pot ection 3 ection ection ection 2 ection ection 2 (c) (d) ection 2 ection 3 Figue 8: The complete test; Pot scheduling fo test section 3; (c) Pot scheduling fo test section 2; (d) Redundancy eduction. Pot Pot m Pot i Pot j w w O Figue 9: Test of intepot faults fo multipot memoies. The base algoithm geneation and the pot scheduling ae simple and systematic. In the base algoithm geneation, the taget fault models ae cell aay faults. Multipot addess decode faults and intepot specific faults ae detected in diffeent test sections. The sepaation of the taget faults significantly educes the complexity of automatic test geneation. Once the test is completed, TAGP can be used to compact the algoithm. The systematic methodology of pot scheduling pevents the test geneation fom complicated manual deivations. When including new intepot fault models, only the new test constaints ae equied fo geneating new test sections. RAME and TAG ae both easily extensible fo new fault models. 5. EXPERIMETAL REULT We demonstate the test geneation and pot scheduling esults with seveal commonly used multipot memoies, including dualpot, foupot, and neadwite memoies.

5 5. Dualpot memoies The test geneation fo dualpot memoies is aleady discussed in the pevious section. The final test is shown in Figue 8(d). The test length is. 5.2 Foupot memoies The test geneation methodology fo a dualpot memoy can be genealized fo othe multipot memoies, assuming each pot is a ead/wite pot. Afte pot scheduling, the oveall test algoithm is shown in Figue and the scheduling esult is highlighted. ote that the tailing ead element is emoved as opposed to the dualpot case, because the element becomes edundant afte the additional w elements fo addess decode faults ae inseted. Pot Pot 3 Pot 4 AF Test Intepot Test Figue : % test fo fou ead/witepot memoies. As the numbe of ead/wite pots inceases, the testing time is dominated by the test fo multipot AFs. The complexity of the Mach test fo multipot memoy is T()= whee m is the numbe of pots. ρ (4m+2) fo m = 2; (4m+) fo m > 2; 5.3 neadwite memoies Fo a memoy of one wite pot and seveal sepaate ead pots, the test elements of multipot specific faults ae diffeent fom that fo memoies of seveal ead/wite pots. The wite opeation can only be applied to the witeonly pot. Figue shows two test categoies to detect AFs in nead wite memoies. The use of W and E ae esticted. They can be used only when Mach guads ae pushed back to the base cell on the boundaies. Pot Pot i Pot j Pot k W E W E Pot Pot i Pot j Pot k E E W W Pot l W W E Figue : Test altenatives of addess decode faults fo n eadwite memoies. The wite opeation has to be applied though the wite pot (pot ), as shown in Figue. To detect the AFs of pot, tests of both pot and pot i ae equied. Fo AFs of ead pots, the combination test of pot and pot j, o pot and pot k is needed. Figue shows fou altenative test elements fo AF. The test elements of pot and pot i detects the AFs fo pot and i. The test elements of othe ead pots, togethe with the test elements of () pot, detects the AFs of pot j, k and l. All the thee pattens ae equivalent fo the AFs of the eadonly pots. imilaly, Figue 2 illustates the patten fo the detection of intepot faults between each ead pot and the witeonly pot. Fo the intepot faults between two ead pots, the patten in Figue 2 can be applied, with pope wite opeation of pot. Pot Pot i Pot j Pot k Figue 2: Test altenatives of intepot faults fo the nead wite memoies. Results fo 2eadwite and 6eadwite memoies ae shown in Figues 3 and 4, espectively. The time complexity can be summaized as 8 < T()= : 3 fo < n» 4; 5 fo 4 < n» 8; (+4 (blog nc+)) fo n > 8; whee n = m andm is the total numbe of pots. Pot w Pot 3 Figue 3: % test fo the 2eadwite memoies. M M M2 M3 M4 M5 M6 Pot Pot 3 Pot 4 Pot 5 Pot 6 Pot 7 Test fo pots of distance Test fo pots of distance 2 Test fo pots of distance 3 Figue 4: Pot scheduling of intepot faults fo the nead wite memoies. 6. DICUIO Fo simplicity, the above cases have been discussed fo bitoiented memoies. When test geneation is applied to a wodoiented memoy, the test algoithm consists of multiple data backgounds. The singlepot algoithm is a cocktail Mach test [6]. The test insetion fo addess decode faults and intepot faults ae simila to the pocedue fo bitoiented memoies. ote that fo wodoiented memoies, in addition to addess scambling, the data may also be scambled, as illustated in Figue 4. In this case, (2)

6 the Mach guads ae applied in paallel, theefoe the test is moe efficient than testing bitoiented memoies. Testing time compaison fo seveal commonly used multipot memoies ae listed in Table 2. The testing time ae linea with small constant factos. Thanks to the efficiency of pot scheduling, the testing time is shote than pevious woks, especially fo lage numbe of pots. Cetain hadtodetect cell faults that need specific test elements to detect, e.g., stuckopen o ead distubance, ae easie to detect with pot scheduling. Fo example, to test OF in a singlepot memoies, we need * (;;) o * (;;) in the test algoithm. With pot scheduling and Mach guads, these specific test elements ae no longe needed, since fault effects in the cell aay ae obsevable though othe pots. Ou methodology has a equiement that the addess scambling of the memoy coe must be available. Functional tests do not have this limitation because the scambling data is only used to lowe the complexity, i.e., fom O( m ) to O(), though it is not mandatoy. Howeve, even with the scambling data, the testing time is still vey long, e.g., most of them ae longe than [,2]. When the long testing time is affodable, complex functional tests may have high fault coveage on complex fault models. The investigation of complex fault models ae beyond ou discussion hee, i.e., we only compae ou appoach with ecent woks that adopt stuctual fault models fo multipot specific defects. Results in Table 2 show that TAGP geneates moe efficient tests than pevious woks when thee ae moe pots. Table 2: Testing time compaison (esults in [5] ae estimated fo the best case). Memoy type TAGP esults Zhao et al. [5] Dualpot mpot, m > 2 (4m+) (m 2) neadwite n > 3 fo < n» 4 5 fo 4 < n» 8 (+4 (blognc+)) fo n > 8 (n ) Test bandwidth is a common concen in pactice. To apply paallel testing on a multipot memoy, the need fo test bandwidth inceases popotionally to the pot numbe. When the test pins ae not enough to delive pattens simultaneously to all pots, tadeoffs have to be made between testing time and numbe of test pins by escheduling. Table 3 shows the escheduling esults when available test pins can povide paallel access to pots anging fom 2 to 6. In case only one pot can be accessed, the test will be degaded to testing each pot sepaately and suffes fom fault coveage loss on intepot faults. In Figue 5, we show a foupot escheduling with a limited test bandwidth fo only 2 pots accessed simultaneously. The testing time is inceased fom 7 to 25. Rescheduling can also educe the bandwidth equiements without testing time penalty in cetain cases, e.g., using 4 pots to test a 6pot memoy as shown in Table 3. Pope multiplexing o dispatching has to be aanged fo deliveing test pattens. Pot Pot 3 Pot 4 Table 3: Pot constaints and testing time. Total pots n Test pots P ae especially suitable fo this pupose, since the simplicity and egulaity of test opeations can educe the hadwae ovehead of the BIT cicuit. Moeove, the addess geneato fo Mach guads can be implemented easily, with a + o on the ow/column addesses. 7. COCLUIO A test algoithm geneation and pot scheduling methodology fo multipot memoies is poposed in this pape. The notion of simulationbased test algoithm geneation, Mach guads, and pot scheduling is intoduced and discussed in detail. The esulting tests ae efficient and costeffective. The egulaity and simplicity of TAGP make it especially suitable fo geneating test algoithms fo builtin selftest (BIT) implementations. Pot scheduling povides not only effective patten compaction but also be able to make tadeoffs between test bandwidth and testing time. Ou futue wok includes suppoting moe fault models, diagnosis algoithm geneation, and BIT designs fo multipot memoies. 8. REFERECE [] M. icolaidis, V. Casto Alves, and H. Bede, testing complex couplings in multipot memoies, IEEE Tans. VLI ystems, vol. 3, no., pp. 59 7, Ma [2] A. J. van de Goo. Hamdioui, Fault models and tests fo twopot memoies, in Poc. IEEE VLI Test ymp. (VT), 998, pp [3] T. Matsumua, An efficient test method fo embedded multipot RAM with BIT cicuity, in Poc. IEEE Int. Wokshop on Memoy Technology, Design and Testing (MTDT), 995, pp [4] Y. Wu and. Gupta, Builtin selftest fo multipot RAMs, in Poc. ixth IEEE Asian Test ymp. (AT), 997, pp [5] J. Zhao,. Iinki, M. Pui, and F. Lombadi, Detection of intepot faults in multipot static RAMs, in Poc. IEEE VLI Test ymp. (VT), 2, pp [6] C.F. Wu, C.T. Huang, K.L. Cheng, and C.W. Wu, imulationbased test algoithm geneation fo andom access memoies, in Poc. IEEE VLI Test ymp. (VT), Monteal, Ap. 2, pp [7] C.F. Wu, C.T. Huang, C.W. Wang, K.L. Cheng, and C.W. Wu, Eo catch and analysis fo semiconducto memoies using Mach tests, in Poc. IEEE Int. Conf. ComputeAided Design (ICCAD), an Jose, ov. 2, pp [8] C.T. Huang, J.R. Huang, C.F. Wu, C.W. Wu, and T.Y. Chang, A pogammable BIT coe fo embedded DRAM, IEEE Design & Test of Computes, vol. 6, no., pp. 59 7, Jan.Ma [9] C.F. Wu, C.T. Huang, and C.W. Wu, RAME: a fast memoy fault simulato, in Poc. IEEE Int. ymp. Defect and Fault Toleance in VLI ystems (DFT), Albuqueque, ov. 999, pp [] A. J. van de Goo, Testing emiconducto Memoies: Theoy and Pactice, John Wiley & ons, Chicheste, England, 99. Figue 5: A foupot test escheduling example. Builtin selftest (BIT) is a popula solution fo the test access/bandwidth poblem. The test algoithms geneated by TAG

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder 20 IEEE/IFIP 9th Intenational Confeence on VLSI and System-on-Chip A Full-mode FME VLSI Achitectue Based on 8x8/ Adaptive Hadamad Tansfom Fo QFHD H264/AVC Encode Jialiang Liu, Xinhua Chen College of Infomation

More information

Effective Missing Data Prediction for Collaborative Filtering

Effective Missing Data Prediction for Collaborative Filtering Effective Missing Data Pediction fo Collaboative Filteing Hao Ma, Iwin King and Michael R. Lyu Dept. of Compute Science and Engineeing The Chinese Univesity of Hong Kong Shatin, N.T., Hong Kong { hma,

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

DPICO: A High Speed Deep Packet Inspection Engine Using Compact Finite Automata

DPICO: A High Speed Deep Packet Inspection Engine Using Compact Finite Automata DPICO: A High Speed Deep Packet Inspection Engine Using Compact Finite Automata Chistophe L. Hayes and Yan Luo Depatment of Electical and Compute Engineeing Univesity of Massachusetts Lowell Lowell, MA,

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Computer Architecture. Pipelining and Instruction Level Parallelism An Introduction. Outline of This Lecture

Computer Architecture. Pipelining and Instruction Level Parallelism An Introduction. Outline of This Lecture Compute Achitectue Pipelining and nstuction Level Paallelism An ntoduction Adapted fom COD2e by Hennessy & Patteson Slide 1 Outline of This Lectue ntoduction to the Concept of Pipelined Pocesso Pipelined

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

CISC 662 Graduate Computer Architecture Lecture 6 - Hazards

CISC 662 Graduate Computer Architecture Lecture 6 - Hazards CISC 662 Gaduate Compute Achitectue Lectue 6 - Hazads Michela Taufe http://www.cis.udel.edu/~taufe/teaching/cis662f07 Powepoint Lectue Notes fom John Hennessy and David Patteson s: Compute Achitectue,

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia CS 61C: Geat Ideas in Compute Achitectue Pipelining Hazads Instucto: Senio Lectue SOE Dan Gacia 1 Geat Idea #4: Paallelism So9wae Paallel Requests Assigned to compute e.g. seach Gacia Paallel Theads Assigned

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Cellular Neural Network Based PTV

Cellular Neural Network Based PTV 3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

The Processor: Improving Performance Data Hazards

The Processor: Improving Performance Data Hazards The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline

More information

Drag Optimization on Rear Box of a Simplified Car Model by Robust Parameter Design

Drag Optimization on Rear Box of a Simplified Car Model by Robust Parameter Design Vol.2, Issue.3, May-June 2012 pp-1253-1259 ISSN: 2249-6645 Dag Optimization on Rea Box of a Simplified Ca Model by Robust Paamete Design Sajjad Beigmoadi 1, Asgha Ramezani 2 *(Automotive Engineeing Depatment,

More information

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

Lecture #22 Pipelining II, Cache I

Lecture #22 Pipelining II, Cache I inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

User Specified non-bonded potentials in gromacs

User Specified non-bonded potentials in gromacs Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

View Synthesis using Depth Map for 3D Video

View Synthesis using Depth Map for 3D Video View Synthesis using Depth Map fo 3D Video Cheon Lee and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oyong-dong, Buk-gu, Gwangju, 500-712, Republic of Koea E-mail: {leecheon, hoyo}@gist.ac.k

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

GCC-AVR Inline Assembler Cookbook Version 1.2

GCC-AVR Inline Assembler Cookbook Version 1.2 GCC-AVR Inline Assemble Cookbook Vesion 1.2 About this Document The GNU C compile fo Atmel AVR isk pocessos offes, to embed assembly language code into C pogams. This cool featue may be used fo manually

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Exploring non-typical memcache architectures for decreased latency and distributed network usage.

Exploring non-typical memcache architectures for decreased latency and distributed network usage. Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Computer Science 141 Computing Hardware

Computer Science 141 Computing Hardware Compute Science 141 Computing Hadwae Fall 2006 Havad Univesity Instucto: Pof. David Books dbooks@eecs.havad.edu [MIPS Pipeline Slides adapted fom Dave Patteson s UCB CS152 slides and May Jane Iwin s CSE331/431

More information