A Study of the Relationship between Usability and Test Cases Precedence Based on a Formal Model for Activity Diagrams

Size: px
Start display at page:

Download "A Study of the Relationship between Usability and Test Cases Precedence Based on a Formal Model for Activity Diagrams"

Transcription

1 A Stuy of the Relationship between Usability an Test Cases Preceence Base on a Formal Moel for Activity Diagrams Pero José Lara Bercial Computer Systems Department Universia Europea e Mari Villaviciosa e Oón, Spain Juan José Escribano Otero Computer System Department Universia Europea e Mari Villaviciosa e Oón, Spain Luis Fernánez Sanz Computer System Department Universia Europea e Mari Villaviciosa e Oón, Spain José Ramón Hilera González Computer Science Department Universia e Alcalá Alcalá e Henares, Mari, Spain Abstract - This paper is focuse on the application of the well-known technique of use cases an especially on the activity iagrams use to represent them to enhance the IS requirements management. Base on previous work of the authors on test generation from use cases an recent stuies about operation time measurement, this new form of aressing requirements management coul offer significant benefits when compare with traitional practices: a) closer integration between functional requirements an usability constraints, b) easier an more profitable way to reuse the effort on the analysis phase an c) better relationship between analysts an users to erive a goo quality specification. This paper shows how formal moel for an extene activity iagram can be use for ouble purpose: A risk analysis on one han an a usability analysis on the other one. Keywors: Use Cases, Activity Diagram, Usability, MTM, Test Cases, Risk Analysis, UML. 1.0 Introuction People involve in software evelopment proects are usually worrie about problems in software quality an its impact on IS (Information Systems) evelopment an relationships Users suffer ba quality stanars of the final release. Bugs, low performance or useless interfaces are goo examples. Developers nee high quality specifications to avoi misunerstaning of requirements, incomplete information, etc. that have a really negative influence on software proects. They woul sooner remove any errors in software requirements to avoi the classical problems of having a poor reference of what the user nees. The relative cost of fixing a efect increases exponentially across the phases of a proect an a high proportion of all problems in software proects have their origin in a poor requisite specification [1]. Clients, i.e. those who pay for the software, suffer the elays on releases ue a ba quality evelopment process. Although the last one is rather concerne to a goo proect planning, the two first facts are irectly relate to the way in which users, analysts, esigners, evelopers an testers communicate among them, specially uring the software requirements specification process. Obviously many approaches have been evise to iminish the impact of these problems an to prevent errors an miscommunications uring the initial phases of a proect. Nowaays, it is generally accepte that goo practices inclue the use of well-known notation guies such as UML [2] an the application of moern software processes like Unifie Process [3]. This an other best practices have enable evelopers to abate traitional problems with a better functional requirements efinition. Use cases are an essential part of UML notation to explain the external behavior of an information system. We can efine a use case as A escription of set of sequences of actions, incluing variants, that a system performs that yiel an observable result of value to an actor [4]. Use cases provie evelopers a way to establish a common unerstaning with en users an omain experts. In aition, use cases help to valiate your architecture an to verify a system as it evolves uring evelopment [2]. Use cases are even more useful when combine with activity iagrams (ADs).

2 An AD is a special case of a state iagram: a moel showing the set of ifferent states of an obect uring its life an the conitions to change from one state to another. In ADs most of states are action states (that ientify what to o in them) an most of transitions are activate when action relate to the previous state finishes. Given a use case escription (applying a stanar representation template [5]), we present below an example of how a use case can be represente as an AD. Use Case: Deleting User Data Goal: Remove all the information about one user in the ata base. Main event flow: Actor System 1. Inits user rop process 2. Asks for 3. Introuces 4. Shows user ata an asks for confirmation 5. Confirms user rop 6. Drop user an Show confirmation. Alternative workflows: If the introuce ID oes not match, a message is shown at step 4 an workflow return to step 3. Any time, if the actor ecies to cancel the action then no changes shoul be one an control return to the main menu. Preconitions: The user to be elete is store in the system Postconitions No information about the elete user may remain in the ata base Interface See figure 1 Deleting User User Data First name Family Name ID Phone Type Billing Nº of actions Warning messages involve in the valiation of requirements ocumentation. In this paper, a formal moel for representing a special kin of AD is shown. These iagrams inclue, for each transition, information about two important issues: risk of error an weight in terms of operation time. Risk, as a function of probability of occurrence, cost of faults an fault proneness of the elements involve in the relate operations to a eterminate transition. Weight, as the time spent by an expert user in orer to complete every action neee to execute the transition Formal Moel of Stanar Activity Diagrams In orer to generalize the use of ADs, we ecie to moel this kin of UML iagram as a igraph. A igraph can be efine as a short for irecte graph, an it is a iagram compose of points calle vertices (noes) an arrows calle arcs going from a vertex to a vertex. Usually an UML AD has the following three stanar elements: - Actions, which coul be of various types: occurrences of primitive functions, such as arithmetic functions, invocations of behavior, such as activities, communication actions, such as sening of signals, manipulations of obects, such as reaing or writing attributes or associations. - Decisions, which split the flow in two ifferent options ientifie by a guar. - Parallel executions, which can be ivie in forks an oins as points of beginning of parallel executions or synchronization. User interface Request user eletion Request user ID Figure 1. User interface From this stanar escription we can generate an AD like the one shown in Figure 2 each scenario of the use case can be etermine by a specific path from the initial activity to the en one an our proposal consists in using AD as the common information collector of both, the generation an ranking of test cases an the operation time measurement of each scenario. This is our reference moel for requisite specification base on applying use case (in a not ifferent way as it is usual in evelopment practice) an ADs to clarify the behavior of the system to en users an evelopers who are Cancel? No User interface Inpunt user ID No Correct ID? YES Cancel? No User Show user ata Request confirmation interface Confirm eletion YES Confirm YES Show confirmation ata No Figure 2. Activity Diagram YES

3 For the formalization of the efinition of an AD, the following assertions will be use: DA: Activity Diagram Ca: Path from the initial noe to the final noe. N A = {graph noes representing Activities in the DA} N D = {graph noes representing Decisions in the DA} N F = {graph noes representing Forks in the DA} N J = {graph noes representing Joins in the DA} T = Transitions in the DA, i.e., every arrow between two ifferent elements an the associate guar, if it exits. N o = Origin of an arrow. N = Destination of an arrow. Now, an AD can be seen as: G = (N, T) N= N A U N D U N F U N J U {start point, en point} T= (ege, guar) an Guar { λ, conition} being λ the empty set conition = boolean expression ege i N O i = i x N + i, Ν an, if k a) i > 1 N N J k = 1.. i N o N F k b) > 1 N o N F k = 1.. N N J 2.0 Test Case Generation an Ranking 2.1. Risk Analysis of the Use Cases Accoring with the NASA stanar STD A [6] the risk is a function of the probability of an event occurs an the severity of the results of this non esirable event. In [7] the necessity of measure the risk are argue in terms of the probability of an error an the cost of it relate with economic cost an human cost. In Obect Oriente Development we shoul keep in min the relationship between Requirements, Use Cases an Test Cases which can be summarize with the following sentence: Test Cases are generate an valiate from an against Use Cases an these ones from an against requirements. So, even before of generate test cases, a stuy capable of ranking the potential test cases shoul be one in orer to get a test cases list with a priority of execution alreay assigne. The focus must be put on two ifferent areas as shown in [8]: - Expert Risk assignment: Using risk analysis tools, as escribe in [9], [7] an [10], a ranking of use case epening on the associate risk can be one. It s absolutely necessary the help of an expert who knows not only the probabilities of every scenario but the cost of an error in every alternate flow of them - Fault proneness assignment: o At Design Time: Using well known metrics riven to measure the faultproneness of esign classes in orer to rank the classes involve in every use case. o At Implementation Time: Using implementation metrics an coe revisions about coe style Test cases generation The application of use cases as reference for generating test cases has been treate in ifferent contributions [11]. Other work lines are base on [12] an [13]. In this case, we propose to use a test case selection criteria base on the exploration of the ifferent execution scenario, consiering a scenario as each ifferent path that coul be trace across an AD. In our metho [14], the first propose selection rule is a coverage criterion similar to the one establishe in [13]. Base on the graph theory of McCabe [15], the minimum set of paths shoul ensure that the execution trace crosses, at least once, all the arrows an eges of the graph [16]. It can be express as follows: A use case (as escribe by its AD) will be enough teste enough if the execution trace covers all the arrows or transitions in the iagram at least once. Accoring to this, five paths can be foun in the iagram of the figure 2 that can be conense in 4 types of interaction between the users an the system: Init eletion, ask for ID an Cancel Init eletion, ask for ID, introuce an incorrect ID, introuce a correct ID, eletion is confirme Init eletion, ask for ID, introuce a correct ID, eletion is cancelle Init eletion, ask for ID, introuce a correct ID, eletion is not confirme Seconly, following the traitional recommenations about black box test esign, an analysis of the omain of the input ata values shoul be one to etect ata groups or classes with a homogeneous behavior. This technique is calle equivalence classes. An equivalence class coul be compoun of a group of vali ata an a group of invali values. For

4 instance, if an input specification escribes a range of values, we consier two classes of invali ata (values uner an over the range limits) an a thir one that groups all the vali values. Our secon selection criterion can be escribe as follows: For each input ata action in a use case, every vali equivalence classes shoul be covere using the minimum number of test cases but each invali class shoul be inclue in a separate test case to monitor all the limit values. In orer to construct an AD with complete information about equivalence classes, we propose to introuce a sub-iagram for every activity noe ata input action is involve. In the rop user example, if we assume that a vali user i is any integer number with a maximum of six igits, the following ata shoul be consiere: , , A546B6, , It is absolutely essential that this information appears in the AD. UML hierarchical ADs are implemente in all commercial tools (e.g. Rational Rose) so they can be use to evelop the iagram shown in figure no number Figure 3. Introuction of the subiagram 3.0 MTM Usability is efine as The effectiveness, efficiency an satisfaction in the way that a eterminate group of users get their goals using a system [17]. We must unerstan efficiency as the relationship between the neee resources to get a goal an the accuracy an completeness in the consecution of it. Base on this, one of the efinitive factors to evaluate the efficiency is the time the user spens to finish the task which coul be efine as operation time (the time the user nee to interact with the system) plus system time (the time the system nee to give back the expecte response. In aition, usability is one of the six main characteristics of software quality 18], so a strong relationship between operation time an software quality can be inferre. One of the most famous contributions to early measurement is the Fitt s Law [19], which is a principle of human movement publishe in 1954 by Paul Fitts which preicts the time require to move from a starting position to a final target area. The kin of motion it escribes is aime an rapi. The time neee to acquire a target is a function of the istance to the target, an the size of the target. Fitts' law is use to moel the act of pointing, both in the real worl, e.g. with a han or finger, an on a computer, e.g. with a mouse. Another important an very popular work on time measurement is the one relate with the GOMS family formal moels for user interface analysis [20] an [21]. The goal of this work is to raically reuce the time an cost of esigning usable systems through eveloping analytic engineering moels for usability base on valiate computational moels of human cognition an performance. These moels take a specification for a user interface esign an a escription of the user tasks that nee to be carrie out, an generate preictions of the time require to learn how to use the system, an the time require for carrying out specific tasks. These preictions can be use instea of empirically collecte ata for much of the esign process, thus saving consierable resources. The current moels aress the proceural quality of the interface -- the complexity, consistency, an spee of the proceures that the user must learn an execute in orer to make use of the system. These moels can help the esign prouce an interface that is reasonably usable, an then the slow an expensive empirical testing can be reserve for examining aspects of the interface not aresse by the moels, an as a final check on the esign. One of the most reference variant of GOMS is known as KLM (for Keystroke-Level Moel) [22]. In the KLM, users are assume to be experts performing routine behavior. This means no mistakes are mae, an no problemsolving activities occur. It also makes KLM- GOMS less useful for activities some amount of thought actually occurs. Actions are assume to be a mostly serial sequence of the following operators. Times taken from [22] are shown in table 1. These times coul be more accurate taking into account the profile of the user (expert, meium, basic) an all of them are etermine empirically an valiate by statistical controls. In the inustry, the work ivision on elemental tasks in orer to improve the performance of assembly line has been stuie since the early XX century.

5 K Keystroke 280 msec T(n) Type n characters P Point with mouse to something on the isplay 280*n msec 1100 msec B Press or release mouse button 100 msec BB Click a mouse button 200 msec H Home hans, either to the keyboar or mouse 400 msec M Mental, thinking 1200 msec W(t) Waiting for the system to respon t msec Table 1. KLM operators from Kieras As a result of the works of Taylor [23] an Gilbreth [24] which were oriente to the evelopment of machinery an operator knowlege, an using the experience accumulate uring more than fifty years, several stanars were evelope to preict times in assembly lines. Two of them are MTM [25], [26] an Work Factor [27]. Our work starts applying a mixture of both to a eterminate activity in a software specification iagram. With the help of an expert in traitional MTM all the possible interactions between a human an a computer program have been stuie iviing them in basic elements an esigning a tool for ata collection. After that the time neee for every element was calculate an a table with all this times measure in (Time Measurement Unit; =1/ hour) was built (Table 2). PU1T Keystroke Initial Conition: Hans on rest BE Space bar 15.1 IT Enter key 21.6 ES Scape key 19.0 ES Special $, % 32.6 PUTE Type something Initial Conition: Hans on keyboar EN Normal Typing 4.0 SE Special Punctuation Signs 11.4 FD Arrow keys 14.8 LETX Rea Something 1P First wor of the text 7.3 TR Rea an translate 11.6 SP Following wors 5.0 LLPU Point with the mouse Initial Conition: Han on Mouse PP0 PE02 Exact Position 2 cm Accuracy 2 cm 9.6 PE04 Exact Position 4 cm 6.0 PP0 4 Accuracy 4 cm 11.6 CO1O1M. Get an obect 16 Ob at 16 cm from us Ob at 30 cm from us Ob at 20 cm from us 12.0 CS1O1M. Get an obect an place it again in other location Get an Move Ob at 16 cm 16 from us Get an Move Ob at 20 cm 20 from us 24.5 Get an Move Ob at 30 cm from us 30.1 SMST2M. Place both hans in some (keyboar). Left han on rest, right han on mouse 16 Keyboar at 16cm Keyboar at 20cm 12.0 Table 2: Propose times for basic movements on software applications

6 To en with the stuy, in one han, a mental element, mentione in Work Factor, was inclue to taking into account those mental process that on t imply a physical motion or change. An, in the other han, a set of important auxiliary elements in software artifacts were taking into account (table 3). Now, we are reay to assign a time measurement to every transition in the AD epening on the basic elements involve in its consecution. ET Eye Movement =15.2*T/D PM Max 20 UMT. 4.0 EF Eye focus 7.3 G2 Get Control 5.6 TD CLIC Click on Mouse 2.0 Mental Process. Time to react if the operator is not aware 3.3 Time to take simple ecisions 3.3 Reflection Process, GC45 45º hea turn 6.7 PR Time to memorize an GC50 50º hea turn 10.0 remember later 3.3 Table 3: Propose auxiliary elements 4.0 Formal Moel of Extene Activity Diagrams Once we know the way to generate an rank test cases an the way to evaluate the operation time, an extene formal moel for ADs is neee to express formally an algorithm to get the esire results but it s necessary to start from these three restrictions: - A well-balance AD [4] shoul be use as starting point. - Let s consier an acyclic AD. As far as we are concern, it s necessary to ensure that every noe in the AD is visite at least once. Two types of loops can be foun in a AD. Those the probability of any number of cycles are the same an those the probability of a new cycle is ecreasing. First type of loops can be simplifie as a new alternate path with a fixe probability. The probability of the secon one shoul follow a Poisson istribution. - The probability of executing a transition is inepenent from the previous one. In aition an in orer to simplify the algorithm, in this paper, the fault proneness stuy is omitte. The affecte elements are the following: N A = {graph noes representing Activities in the DA plus the list of ata to be consiere} In other wors: N A = N A x ata * x OT ata = (i, value * ) * represent the Kleen closure use in regular expressions an OT = time spent by an expert user to complete an activity measure in So, now G = (N, T ) : N= N A U N D U N F U N J U {start point, en point} T = (ege, guar, P, C) i + ege N O x N i, Ν i = i an, if k a) i > 1 N N J k = 1.. i N o N F k b) > 1 N o N F k = 1.. N N J P = Probability of a transaction calculate as: if ( n o, m) N D xn P = 1 if ( n o, m) N D xn 0 < P < 1 n P i = 1 si {( n o, m )...( n o, m )} ege i = 1 1 n ( n0, m ) ege i {1.. n},, = i C = Cost of an error in the transition, calculate as: if ( n o, m) N D xn C = 0 if ( n o, m) N D xn 0 C 5 Base on this, it s possible to write two algorithms, one for generation an rank of paths in the AD (Test Cases) an another for operation time evaluation.

7 4.1. Test cases generation algorithm 1. Generate an AD, restrictions compliant, for each use case. N ' N ' A N = N x ( 1, n )x OT an n 0 a. Assign values to attributes (P, C), using the techniques shown above. b. Buil a sub-iagram each input ata value is inclue (figure 3) an ecision noes referre to correctness of input ata isappear. So, ( i, vi) ata *, create : a new noe Ni a new transition t = (( N, Ni ), ( i = vi), P, C ) an t = (( No t, N t), gt, Pt, Ct ) T gt = ( i = vi) an ( i, vi) ata * elete t 2. Let S the set of ifferent paths existing in the new AD. p S let Tp the set of transition s in p let TD Tp, such as t = ( Not, Nt, gt, Pt, Ct ) TD : No t ND calculate the probabilit y of p as P ( p) = Pt t TD an calculate the cost of p as C ( p) = Max t TD ( Ct) 3. Rank the paths (Test Cases) use the risk of every path as a function f (P(p), C(p)) Operation Time evaluation algorithm The calculation of the operation time is now quite simple. Let s see the following algorithm: 1. Generate an AD, restrictions compliant, for each use case. N ' ( N N ' D) a. Divie the action represente by N in basic elements. b. A software analyst must o an inspection of the user interface to calculate the OT of every element accoring tables 2 an Let S the set of ifferent paths existing in the new AD. Let s istinguish between two kin of paths p S let Np the sorte set of noes in p, Npi is the initial point an Npf the en one 1 n = ( Nn, ata n, OTn ) Np n Nf U N calculate the operation time of p as OT ( p) = OTn n Np 2 n = ( Np, ata p, OTp) Np such as n Nf let p = ( P', Pp, P' ' ) P ' is the path starting at Npi an ening in n let Pp the set of parallel paths starting at n P ' ' is the path starting at the last n Np N an ening in Npf let Np ' the sorte set of noes in P' an let Np ' ' the sorte set of noes in P' ' an calculate the operation time of p as OT ( p) = OT ( p' ) + OT ( Ppi) + Tcc * ( Pp 1) + Ppi Pp OT ( p' ' ) Tcc is a constant representingthe time neee by the user to change from one parallel path to other P p is the number of parallel paths of p 5.0 Conclusion In this paper, a formal moel for UML AD is propose an two of the many potential application of it, have been presente. But, from our point of view, the most important contribution is the formalization of the UML AD an its extension to the extene AD. The algorithms shown above shoul be taken as goo examples of the utility of using a formalization of UML artifacts an how these artifacts can enhance the esign process from software requirements as seen in previous works of the authors [8]. In other sie, it seems to be quite possible to establish a correlation between operation time an risk. Let s see these two reasonable arguments: - The cost of failure in an activity, in terms of user tolerance, is proportional to the operation time of it. - The longer the user interacts with the system the more likely he will make a mistake. Now, we nee a tool to emonstrate it empirically an the extene formalism coul be this tool. Future works are planne to exten the formal moel in orer to get a fully stuy of the risk.

8 This relation explaine in the previous paragraph an fault proneness analysis omitte before must be one extene this formalizations or, even, escribing new formal moel for other artifacts like collaboration iagrams, a relationship between classes on the classes iagram an scenarios on the use cases escription shoul be taking into account to a values of fault proneness to the evaluation of activities risk. References [1] Pressman, R.S., Software Engineering. A practitioners approach. McGraw-Hill, NY, USA, [2] Booch, G. et al., The Unifie Moeling Language User Guie, Aison- Wesley, Upper Sale River, USA. [3] Jacobson, I., et al., Unifie software evelopment, Aison-Wesley, Upper Sale River, USA. [4] OMG, 2001, Unifie Moelling Language Specification, version 1.4. [5] G. Schneier y J. P. Winters, Applying Use Cases. A Practical Guie, Aison- Wesley, [6] NASA, 1997, NASA Technical Stanar A, Software Safety. [7] Hutcheson M.L., 2003, Software Testing Funamentals, Wiley Publishing Inc [8] Fernanez an Lara, Meora e la calia en esarrollos orientaos a obetos utilizano especificaciones UML para la obtencion y preceencia e casos e prueba, AEMES, Spain. [9] Wang T., Hassan A., Gueem A. Abelmoez W., Goseva-Popstoanova K, Ammar, H., 2003, Architectural level risk assessment tool base on UML Specification, Proceeings of the 25 th International Conference on Software Engineering (ICSE 03) [10] Goseva-Popstoanova K., 2003, Architectural-Level Risk Analysis Using UML, IEEE transactions on software engineering, vol. 29, nº 10, octubre 2003, pp [11] Fernánez, J.L., Utilización e casos e uso en las pruebas e aceptación. Actas e las V Jornaas e Innovación y Calia el Software, San Sebastián, Spain, pp [12] Choi E.M. an von Mayrhauser, A., Testing obect-oriente systems using extene usecases, PDPTA Conference, vol. 2. [13] Memnon, A.T. et al., Coverage criteria for GUI testing. 8th European Soft. Engineering Conference (ESEC) & 9th ACM SIGSOFT Intern. Symp. on the Founations of Soft. Eng. (FSE-9), Vienna, Austria. [14] Fernánez, L. an Lara, P., Generación e casos e prueba a partir e especificaciones UML. Actas e las VIII Jornaas e Innovación y Calia el Software, Barcelona, Spain, pp [15] McCabe, T.J., A complexity measure, IEEE Trans.s on software engineering, vol. 2, pp [16] Myers, G.J., The art of software testing. Aison-Wesley, New York, USA [17] Garcia Barriocanal, E. Tesis octoral: Propuesta e un moelo e conocimiento para el uso e cuestionarios en la evaluacion e la usabilia, Universia e Alcalá e Henares, Abril [18] ISO, Information technology. Software quality evaluation characteristics, ISO, Geneve, Switzerlan. [19] Paul M. Fitts (1954). The information capacity of the human motor system in controlling the amplitue of movement. Journal of Experimental Psychology, volume 47, number 6, June 1954, pp (Reprinte in Journal of Experimental Psychology: General, 121(3): , 1992). [20] Kieras, D. E.. A Guie to GOMS moel usability evaluation using NGOMSL. In M. Helaner, T. Lanauer, 1997 an P. Prabhu (Es.), Hanbook of human-computer interaction. (Secon Eition). Amsteram: North-Hollan [21] Bonnie E.J. an Kieras D.; Using GOMS for User Interface Design an Evaluation: Which Technique?; ACM ToCCHI, 1996 [22] Kieras D. Using the Keystroke-Level Moel to Estimate Execution Times, Univ. of Michigan; ftp.eecs.umich.eu/people/kieras/, 2001 [23] F. W. Taylor, The principles of Scientific Management, Harper & Brothers, Nueva york, 1911, 144 páginas [24] Gilbreth, F.B., Memoria presentaa en la reunión aunual e la American Society of Mecanical Engineers; New York, Dic [25] Maynar, 1975, Manual e la ingeniería e la proucción inustrial; H.B. Maynar; E. Reverté S.A., 1975; ISBN: [26] Ralph, Estuio e movimientos y tiempos; Ralph M. Barnes; E. Aguilar S.A., 1970 [27] Joseph H. Quick et al. Work-Factor Time Stanars, McGraw-Hill Book Co., New York, 1962

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

Research Article Research on Law s Mask Texture Analysis System Reliability

Research Article Research on Law s Mask Texture Analysis System Reliability Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November

More information

I DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO

I DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO I DT MC Operating Manual SINAMICS S20 Verification of Performance Level e in accorance with EN ISO 3849- Document Project Status: release Organization: I DT MC Baseline:.2 Location: Erl. F80 Date: 24.09.2009

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Appearance Sensing distance Output configuration Operation mode Model. Appearance Sensing distance Output configuration Operation mode Model

Appearance Sensing distance Output configuration Operation mode Model. Appearance Sensing distance Output configuration Operation mode Model Spatter-resistant Proximity Sensor EEQ CSM_EEQ_DS_E Spatter-resistant Fluororesincoate Proximity Sensor Superior spatter resistance. Long Sensing-istance s ae for sensing istances up to mm. Pre-wire Smartclick

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

Finite Automata Implementations Considering CPU Cache J. Holub

Finite Automata Implementations Considering CPU Cache J. Holub Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Enabling Rollback Support in IT Change Management Systems

Enabling Rollback Support in IT Change Management Systems Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti

More information

Dense Disparity Estimation in Ego-motion Reduced Search Space

Dense Disparity Estimation in Ego-motion Reduced Search Space Dense Disparity Estimation in Ego-motion Reuce Search Space Luka Fućek, Ivan Marković, Igor Cvišić, Ivan Petrović University of Zagreb, Faculty of Electrical Engineering an Computing, Croatia (e-mail:

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Animated Surface Pasting

Animated Surface Pasting Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of

More information

Appearance Sensing distance Output configuration Operation mode Model. Appearance Sensing distance Output configuration Operation mode Model

Appearance Sensing distance Output configuration Operation mode Model. Appearance Sensing distance Output configuration Operation mode Model Spatter-resistant Proximity Sensor EEQ CSM_EEQ_DS_E Spatter-resistant Fluororesincoate Proximity Sensor Superior spatter resistance. Long Sensing-istance s ae for sensing istances up to mm. DC -Wire s.

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Automation of Bird Front Half Deboning Procedure: Design and Analysis

Automation of Bird Front Half Deboning Procedure: Design and Analysis Automation of Bir Front Half Deboning Proceure: Design an Analysis Debao Zhou, Jonathan Holmes, Wiley Holcombe, Kok-Meng Lee * an Gary McMurray Foo Processing echnology Division, AAS Laboratory, Georgia

More information

k-nn Graph Construction: a Generic Online Approach

k-nn Graph Construction: a Generic Online Approach k-nn Graph Construction: a Generic Online Approach Wan-Lei Zhao arxiv:80.00v [cs.ir] Sep 08 Abstract Nearest neighbor search an k-nearest neighbor graph construction are two funamental issues arise from

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

WATER MIST SPRAY MODELLING WITH FDS

WATER MIST SPRAY MODELLING WITH FDS PROCEEDINGS, Fire an Evacuation Moeling Technical Conference 0 Baltimore, Marylan, August 5-6, 0 WATER MIST SPRAY MODELLING WITH FDS Simo Hostikka, Jukka Vaari, Topi Sikanen, Antti Paajanen VTT Technical

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,

More information

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for

More information

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance New Version of Davies-Boulin Inex for lustering Valiation Base on ylinrical Distance Juan arlos Roas Thomas Faculta e Informática Universia omplutense e Mari Mari, España correoroas@gmail.com Abstract

More information

Problem Paper Atoms Tree. atoms.pas. atoms.cpp. atoms.c. atoms.java. Time limit per test 1 second 1 second 2 seconds. Number of tests

Problem Paper Atoms Tree. atoms.pas. atoms.cpp. atoms.c. atoms.java. Time limit per test 1 second 1 second 2 seconds. Number of tests ! " # %$ & Overview Problem Paper Atoms Tree Shen Tian Harry Wiggins Carl Hultquist Program name paper.exe atoms.exe tree.exe Source name paper.pas atoms.pas tree.pas paper.cpp atoms.cpp tree.cpp paper.c

More information

E2EM-X4X1 2M *2 E2EM-X4X2 2M Shielded E2EM-X8X1 2M *2 E2EM-X8X2 2M *1 M30 15 mm E2EM-X15X1 2M *2 E2EM-X15X2 2M

E2EM-X4X1 2M *2 E2EM-X4X2 2M Shielded E2EM-X8X1 2M *2 E2EM-X8X2 2M *1 M30 15 mm E2EM-X15X1 2M *2 E2EM-X15X2 2M Long-istance Proximity Sensor EEM CSM_EEM_DS_E_7_ Long-istance Proximity Sensor Long-istance etection at up to mm enables secure mounting with reuce problems ue to workpiece collisions. No polarity for

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

INDEX SET that the utmost attention is paid to the following 5. 7 instructions and to save it.

INDEX SET that the utmost attention is paid to the following 5. 7 instructions and to save it. TLE 20 MICROPROCESSOR-BASED DIGITAL ELECTRIC FREEZER CTROLLER OPERATING INSTRUCTIS Vr. 0 (ENG) - 09/0 - co.: ISTR 0720 FOREWORD TECNOLOGIC S.p.A. VIA INDIPENDENZA 27029 VIGEVANO (PV) ITALY TEL.: +39 038

More information

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Advanced method of NC programming for 5-axis machining

Advanced method of NC programming for 5-axis machining Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia

More information

A new fuzzy visual servoing with application to robot manipulator

A new fuzzy visual servoing with application to robot manipulator 2005 American Control Conference June 8-10, 2005. Portlan, OR, USA FrA09.4 A new fuzzy visual servoing with application to robot manipulator Marco A. Moreno-Armenariz, Wen Yu Abstract Many stereo vision

More information

Using Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1

Using Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1 Using Ray Tracing for Site-Specific Inoor Raio Signal Strength Analysis 1 Michael Ni, Stephen Mann, an Jay Black Computer Science Department, University of Waterloo, Waterloo, Ontario, NL G1, Canaa Abstract

More information

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal 991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea

More information

Experion PKS R500 Migration Planning Guide

Experion PKS R500 Migration Planning Guide Experion PKS R500 Migration Planning Guie EPDOC-XX70-en-500E May 2018 Release 500 Document Release Issue Date EPDOC-XX70- en-500e 500 0 May 2018 Disclaimer This ocument contains Honeywell proprietary information.

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Optimization of cable-stayed bridges with box-girder decks

Optimization of cable-stayed bridges with box-girder decks Avances in Engineering Software 31 (2000) 417 423 www.elsevier.com/locate/avengsoft Optimization of cable-staye briges with box-girer ecks L.M.C. Simões*, J.H.J.O. Negrão Department of Civil Engineering,

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic 24 International Journal Information Theories an Applications, Vol. 23, Number 1, (c) 2016 Clustering using Particle Swarm Optimization Nuria Gómez Blas, Octavio López Tolic Abstract: Data clustering has

More information

Proving Vizing s Theorem with Rodin

Proving Vizing s Theorem with Rodin Proving Vizing s Theorem with Roin Joachim Breitner March 25, 2011 Proofs for Vizing s Theorem t to be unwiely unless presente in form a constructive algorithm with a proof of its correctness an termination.

More information