Improved Circuit-to-CNF Transformation for SAT-based ATPG

Size: px
Start display at page:

Download "Improved Circuit-to-CNF Transformation for SAT-based ATPG"

Transcription

1 Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, Bremen, Germany {tille,drehsle}@informatik.uni-bremen.de 2 NXP Semiondutors Germany GmbH, Hamburg, Germany {rene.krenz-baath,juergen.shloeffel}@nxp.om Abstrat SAT-based ATPG has proven to be a benefiial omplement to traditional ATPG tehniques. The generation of a CNF-representation is a vital issue in SAT-based test pattern generation. Firstly, the generation of the problem instanes for SAT-based ATPG requires a signifiant portion of the overall runtime. Seondly, the performane of the SAT solver strongly depends on the properties of the resulting CNF-representation. The ontribution of this paper is a new approah to generate CNF-representations for SAT-based ATPG. The objetive of the proposed tehnique is to speed up the generation proess and to optimize the resulting CNF-representation with respet to the SAT omputation. The experimental results, obtained on large industrial designs, show that the aomplished optimizations result in a signifiant redution of the overall runtime of the SAT-based test pattern generation proess. Finally we disuss how this ontribution enables some promising future work. I. INTRODUCTION The ontinuous growth of today s iruit designs requires a onstant improvement of state-of-the-art omputer-aided design (CAD) and omputer-aided test (CAT) tools. During reent years SAT-based ATPG algorithms beame a promising alternative to traditional ATPG tehniques suh as FAN [1] and PODEM [2]. In partiular for hard-to-solve problem instanes SAT-based methods proved to be highly advantageous [3], [4], [5], [6]. However, SAT-based ATPG algorithms suffer from a number of disadvantages. Most modern SAT-solvers [7], [8], [9], [10] require the modeling of the problem in Conjuntive Normal Form (CNF). Hene the ATPG problem needs to be onverted into one or several CNF-representations. Furthermore SAT-based ATPG tehniques tend to deliver overdetermined test pattern whih is disadvantageous with respet to pattern ompation and runtime. The ontribution of this paper is a new approah to effiiently generate CNF-representations for SAT-based ATPG. The proposed tehnique employs Redued Ordered Binary Deision Diagrams (ROBDDs) [11] in order to generate optimized CNF-instanes during test pattern generation. The This work was done during a researh visit at the NXP development enter in Hamburg, Germany. new approah onstruts ROBDD-representations of Fanout- Free Regions (FFRs) in the iruit graph, where every FFR is treated as an individual sub-iruit. To derive CNFrepresentations diretly from these ROBDDs provides several advantages over traditional approahes. Funtional redundanies ontained in the FFR will not be refleted by the resulting CNF. Furthermore the number of CNF-variables is redued drastially. Finally the number of CNF-lauses in the problem instanes is onsiderably dereased. The experimental results show that the proposed approah is a promising alternative to traditional iruit-to-cnf transformation tehniques. The paper is strutured as follows. Previous work is disussed in Setion II. The proposed approah is the objetive of Setion III. Experimental results are presented in Setion IV. Setion V onludes the paper and disusses future work. A. SAT-based ATPG II. PREVIOUS WORK Test pattern generation with respet to some Stuk-At Fault (SAF) is the searh for an input assignment, whih onduts different values at some primary output between the faulty iruit and the orret iruit. SAT-based ATPG was initially proposed by Larrabee in [3]. Signifiant improvements were ahieved by Stephan et al. in [12] and by Silva and Sakallah in [13]. In SAT-based ATPG the problem of finding a suffiient input assignment is transformed into a Boolean satisfiability problem suh that if a test for a partiular SAF exists, then the orresponding problem instane is satisfiable and the resulting test pattern an be diretly derived from the satisfying assignment. If the fault is undetetable the SAT solver onludes unsatisfiability. In the following the iruit-to-cnf transformation for an SAF is reviewed. Figure 1 illustrates a ombinational iruit. The fault loation denotes a onnetion where an SAF is assumed. The area denoted as output one, ontains all gates belonging to some path P from to some primary output in the reflexive fanout of, fanout ({}). Let us denote the set of primary outputs reahable from by O. Next the reflexive

2 fault loation a reflexive fanin output one b Fig. 1. Illustration of influened iruit areas. (a + b + ) (a + b + ) (a + ) fanin, fanin (O ), of all primary outputs in O is omputed, see Figure 1. As introdued in [4], two Boolean variables G(v) and G f (v) are assigned to every gate v in the reflexive fanout of, v fanout ({}), to represent the fault free iruit and the faulty iruit, respetively. Both iruits are generated by building the harateristi funtion for every gate. Clearly all gates belonging to the reflexive fanin of some primary output in the set O and are not ontained in fanout ({}) only need to be modeled one, sine the SAF at does not influene their behaviour. To express a differene of the values at G(v) and G f (v), additionally a Boolean variable G d (v) is assigned to every gate v fanout ({}). If G d (v) is true, then the values G(v) and G f (v) differ. A test pattern to detet the SAF at is found if it is possible to ompute an assignment suh that there exists a path P from to some primary output, where the variable G d (v) for eah gate v P is true. This path is alled D-hain. B. ROBDDs The proposed tehnique employs ROBDDs as a anonial representation of Boolean funtions [11]. Canoniity allows signifiant performane improvements for operations suh as equivalene heking or satisfiability heking. Additionally ROBDDs are a highly effetive representation for large ombinational sets, whih is ruial for model heking tasks [14]. Given an ROBDD representing some Boolean funtion a CNF of this funtion an be generated as follows: Let P be a path from the root node to the zero-terminal node. A lause an be derived by the disjuntion of the omplement of eah variable ourring in P. In Figure 2 an example for this ROBDD-to-CNF onversion is given. An ROBDD onsisting of three variables is depited in Figure 2(a). The solid lines represent the high-edges and the dashed lines represent the low-edges. The CNF desribing the same Boolean funtion as the ROBDD is given in Figure 2(b). To generate the CNF all paths from the root node (labeled with a) to the zero-terminal node (labeled with 0) have to be traversed. Sine there exist three suh paths in the ROBDD the CNF onsists of three lauses. The first lause is derived by applying the approah explained above to the path onsisting of all high-edges. The seond lause (along a high b low low ) and the third lause (along a low low ) are built the same way. Fig (a) 0 (b) Example for the ROBDD-to-CNF onversion: (a) ROBDD, (b) CNF. As mentioned above the number of lauses in the CNF is equal to the number of zero-paths in the ROBDD. Unfortunately in the worst ase the number of zero-paths is exponential with respet to the number of nodes (e.g., the EXOR funtion). A sophistiated approah whih introdues auxiliary variables in order to redue the number of paths in the ROBDD is proposed in [15]. The minimization of the number of paths in an ROBDD using different sifting strategies is desribed in [16]. III. IMPROVED CIRCUIT-TO-CNF TRANSFORMATION The traditional approah to derive a CNF-representation from a iruit graph is desribed in Setion II. The CNFrepresentation of every single gate is generated without onsideration of the adjaent iruit struture. It is obvious that this onept, although simple, does not generate a ompat CNF-representation of the problem instane. The goal of the proposed tehnique is to inrease the effiieny of the CNF-generation proess itself and to improve the properties of the generated problem instane with respet to the sueeding reasoning proess. This is aomplished by first generating an ROBDD-based representation of speifi parts of the iruit graph, and later on deriving the orresponding CNFs from these ROBDDs. The iruit is deomposed along Fanout-Free Regions (FFRs) in the iruit graph, where eah FFR is treated as an individual sub-iruit. The D-hains (f. Subsetion II-A) are build along FFRs, i.e. variables G d are only assigned to FFR-output gates. A. Observations The proposed approah is based on the following observations: 1) Kuehlmann and Krohm showed in [17] that industrial iruits ontain a large amount of funtional redundanies. A CNF derived from the orresponding ROBDD

3 a b d e f g h FFRh i j FFRk k (d + b + ) (d + b) (d + ) (e + b + ) (e + b) (e + ) (h + f + g) (h + f) (h + g) (f + d) (f + d ) (g + e) (g + e ) Fig. 3. Illustrative example. (a) will not reflet these redundanies. This yields a redution in the number of lauses and the amount of CNFvariables in the resulting problem instane. 2) The presented tehnique works similar to the onept of supergates, where a set of gates in a iruit graph is merged to a larger gate [18]. Thus the number of CNFvariables required to generate the CNF of this set of gates is signifiantly smaller than the amount of CNFvariables produed by the traditional approah. 3) We observed that numerous FFRs or their subfuntions are funtionally equivalent. Treating FFRs as independent sub-iruits leads to an inreased sharing of ROBDD-strutures for the representation of several funtionally equivalent iruit-strutures. Note that we refer to the funtional equivalene of gates with respet to the inputs of individual FFRs. B. Illustrative Example The following example larifies the observations disussed in Subsetion III-A. The iruit graph depited in Figure 3 ontains two FFRs, named FFR h and FFR k orresponding to the names of their output gates. The set of gates belonging to the individual FFRs is indiated by dotted lines. Considering FFR h it is easy to see that gates d, e, and h implement the same Boolean funtion, b, with respet to the FFR-inputs b and. Transforming these gates in the traditional way would require 7 CNF-variables and 13 lauses. The proposed tehniques would instead generate only 3 CNFvariables and 3 lauses. These improvements are expliitly obtained through redundany removal as desribed in the first observation in Subsetion III-A. Figure 4 presents two alternative CNF-representations of the Boolean funtion implemented by FFR h in Figure 3. Part (a) of Figure 4 shows the CNF-representation obtained using the traditional approah, where a CNF is generated for every single gate in the iruit graph. This tehnique introdues a CNFvariable for every single gate ontained in the FFR and ignores possible redutions with respet to adjaent gates. Figure 4(b) ontains the result of the ROBDD-to-CNF transformation, where the CNF-representation is derived from the BDD-based representation of FFR h as desribed in Subsetion II-B. Generating the CNF-representation of the Boolean funtion implemented by FFR k in the traditional way would require 6 CNF-variables. As desribed in the seond observation, it is possible to redue the number of required CNF-variables to 4 (h + b + ) (h + b) (h + ) (b) Fig. 4. CNFs of the example: (a) Traditionally derived CNF, (b) ROBDDderived CNF. by treating the FFR as a single but more omplex gate. As mentioned above every FFR is treated as an individual Boolean funtion. Variables used in the orresponding ROBDD-representations are re-used for every individual FFR. Let us assume that the ROBDD-variables x 1, x 2, and x 3 are assigned to the FFR-inputs a, h, and, respetively, of FFR k. Furthermore we assume the order of the ROBDD-variables to be x 1, x 2, x 3. Then the generated ROBDD-struture an be partially re-used to also represent the funtion implemented by FFR h, assuming that the FFR-inputs b and are assigned to x 1 and x 2, respetively. In pratie this feature ontributes to a dramati redution of the number of generated ROBDDnodes and hene a signifiant improvement with respet to the memory onsumption. C. Implementation Details In the following we disuss issues regarding the implementation of the proposed tehnique. The onstrution of the ROBDD-based representations is aomplished during a preproessing step. This means the iruit-to-robdd onversion is performed only one. As BDD pakage we hoose to apply the well-known CUDD pakage [19] version CNF-representations of individual FFRs are generated multiple times during a omplete ATPG run. In the urrent implementation the initially omputed ROBDDs will be repeatedly used during the entire ATPG run. The derivation of the CNF from the orresponding ROBDDrepresentation is disussed in Setion II. The number of literals ontained in the generated CNF-lauses is signifiantly redued by using the prime impliants in the ROBDDs. The mapping of ROBDD-variables onto the orresponding CNF-variables is aomplished during every individual CNFgeneration. During first experiments it was observed that the number of prime impliants and hene the number of lauses derived from an ROBDD often exeed the number of lauses generated by the traditional approah. We observed that this

4 situation appears frequently for ROBDD-representations of FFRs with more than 16 inputs. Therefore it was deided to add two limitations in order to prevent suh an inrease of the CNF size. Firstly a iruit-to-robdd transformation is only performed for FFRs with 16 or less inputs. Seondly the number of lauses generated by the traditional approah is estimated. FFRs whose ROBDD-representation exeeds this limit are not onsidered during the sueeding ROBDD-to- CNF transformation. The estimation is based on the following two assumptions: the FFR does only ontain two-input gates, and the CNF-representation of every individual gate in the FFR would require three lauses, e.g., AND, NAND, OR, NOR. Based on these assumptions the following ost funtion an be formulated: n lauses = 3(n inputs 1), where n lauses denotes the estimated number of lauses, and n inputs represents the number of FFR-inputs. For example the estimated amount of resulting lauses for a 4-input FFR and for an 11-input FFR would be 9 lauses and 30 lauses, respetively. Furthermore, the urrent implementation does only onstrut ROBDD-representations of FFRs whih do not require an enoding for four-valued logi. IV. EXPERIMENTAL RESULTS This setion ontains an experimental evaluation of the proposed tehnique. We will demonstrate that the new approah redues the number of variables and the number of lauses in the problem instane signifiantly. The obtained runtime improvements onfirm that the proposed optimizations result in a onsiderable speed-up of the atual pattern generation. The new tehnique was integrated into a prototype version of the NXP Semiondutors ATPG tool AMSAL and applied to a set of benhmarks onsisting of four large industrial designs. The used SAT-solver is MiniSat version 1.14 [10]. The experiments were performed on a PC equipped with a 2.4 GHz AMD Opteron 880 CPU and 64 GByte main memory running RedHat Enterprise 4. Table I provides a first set of experimental results. Columns one to four ontain information about the iruits, suh as benhmark name, number of inputs, number of outputs, and number of targets, respetively. The set of targets ontains all remaining faults after fault ollapsing. The name of the benhmark reflets the approximate number of gates ontained in the iruit. For example benhmark p141k ontains roughly 141,000 gates. Building all ROBDDs for the tested designs as proposed in Setion III requires less than two seonds of CPU time and the additional memory onsumption does not exeed 50 MByte. Further details about the number of FFRs transformed into ROBDDs and the CNF-size savings are given in Table II. TABLE I BENCHMARK STATISTICS AND RESULTS OBTAINED BY THE PRESENTED ALGORITHM IN COMPARISON TO THE TRADITIONAL APPROACH USING A SET OF INDUSTRIAL BENCHMARKS. runtime runtime Benhmarks Inputs Output Targets without ROBDDs with ROBDDs p141k 11,290 10, ,946 5:23h 3:44h p267k 17,332 16, ,773 16:27m 10:53m p330k 18,010 17, ,756 1:48h 1:38h p418k 30,430 29, ,022 3:42h 3:33h TABLE II FURTHER RESULTS OBTAINED BY THE PRESENTED ALGORITHM IN COMPARISON TO THE TRADITIONAL APPROACH. % % % Benhmarks treated saved saved FFRs lauses CNF-vars p141k p267k p330k p418k Although only a subset of FFRs in the iruit graph has been onsidered, see seond olumn in Table II, runtime redutions of 30.65% and 33.84% for the designs p141k and p267k, respetively, have been obtained. However, the overall runtimes, listed in the most right olumn of Table I, do not reflet the ahieved improvements with respet to the atual runtime required to find a suffiient input assignment. In order to provide this information a set of diagrams is depited whih ontains individual SAT-runtimes for every omputed target. Figure 5 omprises four diagrams, whih diretly ompare the runtimes required by the SAT-solver with and without the proposed preproessing tehnique. Eah entry represents the omputation times onsumed for a single target. The runtime is onsiderably redued for a large number of targets. The seond set of diagrams, given in Figure 6, illustrates the ahieved improvements with respet to the number of lauses to model the Boolean funtion implemented by an individual FFR. Note that these results only reflet the lause redution of FFRs treated by the proposed tehnique. The number of lauses is onsiderably redued in nearly all ases. In partiular for larger FFRs the number of lauses ould be redued signifiantly. One reason for that is the higher likelihood of redundanies ontained in these FFRs. The redution of the number of lauses and the number of CNF-variables due to redundany removal is disussed in Setion III. Columns three and four in Table II report the perental redution of the number of lauses and the number of CNF-variables with respet to all FFRs treated by the proposed tehnique. V. CONCLUSIONS AND FUTURE WORK The ontribution of this paper is a new approah to effiiently translate a iruit-based ATPG problem into a orresponding CNF-representation. In ontrast to traditional approahes, whih onstrut the CNF-representation of every single gate without onsidering the adjaent iruit struture, the new tehnique generates the CNF-representation of a set

5 Fig. 6. FFRs. Fig. 5. Runtime omparison for individual targets. Number of lauses ontained in the CNF-representation of individual of gates. The proposed tehnique employs ROBDDs in order to redue the resulting problem instane with respet to the number of lauses and the amount of CNF-variables. The experimental results onfirm that the overall runtime of the ATPG omputation an be signifiantly redued using the new tehnique. Our future work involves the appliation of the proposed onept to other fault models, e.g. the gate delay fault model and the path delay fault model. Additionally the tehnique an be extended to handle multiple-valued logi whih is ontained in many industrial iruits. ACKNOWLEDGEMENTS Parts of this researh work were supported by the German Federal Ministry of Eduation and Researh (BMBF) in the Projet MAYA under the ontrat number 01M3172B. REFERENCES [1] H. Fujiwara and T. Shimono, On the aeleration of test generation algorithms, IEEE Trans. on Comp., vol. 32, pp , [2] P. Goel, An impliit enumeration algorithm to generate tests for ombinational logi, IEEE Trans. on Comp., vol. 30, pp , [3] T. Larrabee, Test pattern generation using Boolean satisfiability, IEEE Trans. on CAD, vol. 11, pp. 4 15, [4] P. Stephan, R.K. Brayton, and A.L. Sangiovanni-Vinentelli, Combinational test generation using satisfiability, IEEE Trans. on CAD, vol. 15, pp , [5] J. Shi, G. Fey, R. Drehsler, A. Glowatz, F. Hapke, and J. Shlöffel, PASSAT: Effient SAT-based test pattern generation for industrial iruits, in IEEE Annual Symposium on VLSI, 2005, pp [6] D. Tille, S. Eggersglüß, G. Fey, R. Drehsler, A. Glowatz, F. Hapke, and J. Shlöffel, Studies on integrating SAT-based ATPG in an industrial environment, in GI/ITG Workshop Testmethoden und Zuverlässigkeit von Shaltungen und Systemen, [7] J.P. Marques-Silva and K.A. Sakallah, GRASP a new searh algorithm for satisfiability, in Int l Conf. on CAD, 1996, pp [8] M.W. Moskewiz, C.F. Madigan, Y. Zhao, L. Zhang, and S. Malik, Chaff: Engineering an effiient SAT solver, in Design Automation Conf., 2001, pp [9] E. Goldberg and Y. Novikov, BerkMin: a fast and robust SAT-solver, in Design, Automation and Test in Europe, 2002, pp [10] N. Eén and N. Sörensson, An extensible SAT solver, in SAT 2003, 2004, vol of LNCS, pp [11] R.E. Bryant, Graph-based algorithms for Boolean funtion manipulation, IEEE Trans. on Comp., vol. 35, no. 8, pp , [12] P. R. Stephan, R. K. Brayton, and A. Sangiovanni-Vinentelli, Combinational test generation using satisfiability, Teh. Rep. UCB/ERL M92/112, Dept. of EECS, Univ. of California, Berkeley, Otober [13] J.P. Marques-Silva and K.A. Sakallah, Robust searh algorithms for test pattern generation, Teh. Rep. RT/02/97, Dept. of Informatis, Tehnial University of Lisbon, Lisbon, Protugal, January [14] K.L. MMillan, Symboli Model Cheking, Kluwer Aademi Publisher, [15] G. Cabodi, S. Noo, and S. Quer, SAT-based bounded model heking by means of BDD-based approximate traversals, in Design, Automation and Test in Europe, 2003, pp [16] G. Fey and R. Drehsler, Minimizing the number of paths in BDDs: Theory and algorithm, in IEEE Trans. on CAD, 2006, pp [17] A. Kuehlmann and F. Krohm, Equivalene heking using uts and heaps, in Design Automation Conf., 1997, pp [18] S.C. Seth, L. Pan, and V.D. Agrawal, Predit - probabilisti estimation of digital iruit testability, in Int l Symp. on Fault-Tolerant Comp., 1985, pp [19] F. Somenzi, CUDD: CU Deision Diagram Pakage Release 2.3.1, University of Colorado at Boulder, 2001.

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

On the Generation of Multiplexer Circuits for Pass Transistor Logic

On the Generation of Multiplexer Circuits for Pass Transistor Logic Preprint from Proeedings of DATE 2, Paris, rane, Marh 2 On the Generation of Multiplexer Ciruits for Pass Transistor Logi Christoph Sholl Bernd Beker Institute of Computer Siene Albert Ludwigs University

More information

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Department of Eletrial and Computer Engineering University of Wisonsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 2014-2015 Assignment #2 Date Tuesday, September 25, 2014 Due

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

On the Relation between SAT and BDDs for Equivalence Checking

On the Relation between SAT and BDDs for Equivalence Checking On the Relation between SAT and BDDs for Equivalence Checking Sherief Reda 1 Rolf Drechsler 2 Alex Orailoglu 1 1 Computer Science & Engineering Department University of California, San Diego La Jolla,

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Space- and Time-Efficient BDD Construction via Working Set Control

Space- and Time-Efficient BDD Construction via Working Set Control Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.

More information

Definitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework

Definitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework EECS 33 There be Dragons here http://ziyang.ees.northwestern.edu/ees33/ Teaher: Offie: Email: Phone: L477 Teh dikrp@northwestern.edu 847 467 2298 Today s material might at first appear diffiult Perhaps

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

Using Synthesis Techniques in SAT Solvers

Using Synthesis Techniques in SAT Solvers 1. Introduction Using Synthesis Techniques in SAT Solvers Rolf Drechsler Institute of Computer Science University of Bremen 28359 Bremen, Germany drechsle@informatik.uni-bremen.de Abstract In many application

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

M32: A Constructive Multilevel Logic Synthesis System*

M32: A Constructive Multilevel Logic Synthesis System* M32: A Construtive Multilevel Logi Synthesis System* Vitor N. Kravets Karem A. Sakallah Department of Eletrial Engineering and Computer Siene University of Mihigan, Ann Arbor, MI 48109 {vkravets, karem}@ees.umih.edu

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

35 th Design Automation Conference Copyright 1998 ACM

35 th Design Automation Conference Copyright 1998 ACM Using Reongurable Computing Tehniques to Aelerate Problems in the CAD Domain: A Case Study with Boolean Satisability Peixin Zhong, Pranav Ashar, Sharad Malik and Margaret Martonosi Prineton University

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any urrent or future media, inluding reprinting/republishing this material for advertising

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

Alleviating DFT cost using testability driven HLS

Alleviating DFT cost using testability driven HLS Alleviating DFT ost using testability driven HLS M.L.Flottes, R.Pires, B.Rouzeyre Laboratoire d Informatique, de Robotique et de Miroéletronique de Montpellier, U.M. CNRS 5506 6 rue Ada, 34392 Montpellier

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Menu. X + /X=1 and XY+X /Y = X(Y + /Y) = X

Menu. X + /X=1 and XY+X /Y = X(Y + /Y) = X Menu K-Maps and Boolean Algera >Don t ares >5 Variale Look into my... 1 Karnaugh Maps - Boolean Algera We have disovered that simplifiation/minimization is an art. If you see it, GREAT! Else, work at it,

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

A Fast Kernel-based Multilevel Algorithm for Graph Clustering

A Fast Kernel-based Multilevel Algorithm for Graph Clustering A Fast Kernel-based Multilevel Algorithm for Graph Clustering Inderjit Dhillon Dept. of Computer Sienes University of Texas at Austin Austin, TX 78712 inderjit@s.utexas.edu Yuqiang Guan Dept. of Computer

More information

An Interactive-Voting Based Map Matching Algorithm

An Interactive-Voting Based Map Matching Algorithm Eleventh International Conferene on Mobile Data Management An Interative-Voting Based Map Mathing Algorithm Jing Yuan* University of Siene and Tehnology of China Hefei, China yuanjing@mail.ust.edu.n Yu

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Checking Equivalence for Circuits Containing Incompletely Specified Boxes

Checking Equivalence for Circuits Containing Incompletely Specified Boxes Freiburg, Germany, September 00 Checking Equivalence for Circuits Containing Incompletely Specified Boxes Christoph Scholl Bernd Becker Institute of Computer Science Albert Ludwigs University D 79110 Freiburg

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

A Compressed Breadth-First Search for Satisfiability

A Compressed Breadth-First Search for Satisfiability A Compressed Breadth-First Searh for Satisfiaility DoRon B. Motter and Igor L. Markov Department of EECS, University of Mihigan, 1301 Beal Ave, Ann Aror, MI 48109-2122 dmotter, imarkov @ees.umih.edu Astrat.

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 21, no. 2, August 2008, 209-220 Comparison of Higher Order FEM and MoM/SIE Approahes in Analyses of Closed- and Open-Region Eletromagneti Problems Milan

More information

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes Redued-Complexity Column-Layered Deoding and Implementation for LDPC Codes Zhiqiang Cui 1, Zhongfeng Wang 2, Senior Member, IEEE, and Xinmiao Zhang 3 1 Qualomm In., San Diego, CA 92121, USA 2 Broadom Corp.,

More information

Efficient and scalable trie-based algorithms for computing set containment relations

Efficient and scalable trie-based algorithms for computing set containment relations Effiient and salale trie-ased algorithms for omputing set ontainment relations Yongming Luo #1, George H. L. Flether #2, Jan Hidders 3, Paul De Bra #4 # Eindhoven University of Tehnology, The Netherlands

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Cluster Centric Fuzzy Modeling

Cluster Centric Fuzzy Modeling 10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Evolutionary Feature Synthesis for Image Databases

Evolutionary Feature Synthesis for Image Databases Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Optimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints

Optimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints 5 JOURNAL OF SOFTWARE VOL. 8 NO. 8 AUGUST Optimization of Two-Stage Cylindrial Gear Reduer with Adaptive Boundary Constraints Xueyi Li College of Mehanial and Eletroni Engineering Shandong University of

More information

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European

More information

Optimization-based Multiple Target Test Generation for Highly Compacted Test Sets

Optimization-based Multiple Target Test Generation for Highly Compacted Test Sets Optimization-based Multiple Target Test Generation for Highly Compacted Test Sets Stephan Eggersglüß Kenneth Schmitz René Krenz-Bååth Rolf Drechsler Institute of Computer Science University of Bremen 28359

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Robust Dynamic Provable Data Possession

Robust Dynamic Provable Data Possession Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Optimizing Sparse Matrix Operations on GPUs using Merge Path

Optimizing Sparse Matrix Operations on GPUs using Merge Path 21 IEEE 29th International Parallel and Distributed Proessing Symposium Optimizing Sparse Matrix Operations on GPUs using Merge Path Steven Dalton, Luke Olson Department of Computer Siene University of

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Naïve Bayesian Rough Sets Under Fuzziness

Naïve Bayesian Rough Sets Under Fuzziness IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

Scheduling Commercial Videotapes in Broadcast Television

Scheduling Commercial Videotapes in Broadcast Television Sheduling Commerial Videotapes in Broadast Television Srinivas Bollapragada bollapragada@researh.ge.om GE Global Researh Center 1 Researh Cirle, Shenetady, NY 12309 Mihael Bussiek MBussiek@gams.om GAMS

More information

Numerical simulation of hemolysis: a comparison of Lagrangian and Eulerian modelling

Numerical simulation of hemolysis: a comparison of Lagrangian and Eulerian modelling Modelling in Mediine and Biology VI 361 Numerial simulation of hemolysis: a omparison of Lagrangian and Eulerian modelling S. Pirker 1, H. Shima 2 & M. Stoiber 2 1 Johannes Kepler University, 4040 Linz,

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Scheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiprocessor

Scheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiprocessor Sheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiproessor Orlando Moreira NXP Semiondutors Researh Eindhoven, Netherlands orlando.moreira@nxp.om Frederio Valente Universidade

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information