Construction of ROBDDs. area. that such graphs, under some conditions, can be easily manipulated.

Size: px
Start display at page:

Download "Construction of ROBDDs. area. that such graphs, under some conditions, can be easily manipulated."

Transcription

1 A Study of Composton Schemes for Mxed Apply/Compose Based Constructon of s A Narayan 1 S P Khatr 1 J Jan 2 M Fujta 2 R K Brayton 1 A Sangovann-Vncentell 1 Abstract Reduced Ordered Bnary Decson Dagrams (s) have tradtonally been bult n a bottom-up fashon In ths scheme, the ntermedate peak memory utlzaton s often larger than the nal sze, lmtng the complexty of the crcuts whch can be processed usng S Recently we showed that for a large number of applcatons, the peak memory requrement can be substantally reduced by a sutable combnaton of bottom up (decomposton based) and top down (composton based) approaches of buldng s In ths paper, we focus on the composton process We detal four heurstc algorthms for ndng good composton orders, and compare ther utlty on a set of standard benchmark crcuts Our schemes oer a matrx of tme-memory tradeo ponts 1 Introducton In the last decade s [3] have frequently been used as the representaton of choce to solve varous CAD problems such as synthess, dgtal-system vercaton and testng s are canoncal gven a varable orderng, and hence the nal sze of the representaton s a constant, regardless of the sequence of boolean operatons by whch the was constructed In the tradtonal (apply based) scheme of constructng s, the peak ntermedate memory requrement often far exceeds the nal (canoncal) representaton sze of the gven functon Although we are solely nterested n obtanng the of the output, the ntermedate peak memory requrement often lmts our ablty to construct the output, and also usually dctates the tme requred for constructon It would therefore be very desrable to construct s n a fashon whch reduces the ntermedate peak memory requrement The presence of an ntermedate peak followed by a subsequent reducton n the memory requrements ndcates that Boolean smplcaton has occurred n the crcut We attempt to capture ths Boolean smplcaton by followng the general procedure outlned n [8] We ntroduce sutable decomposton ponts, and perform all computatons on smaller decomposed graphs Thus, we get a decomposed representaton of the output functon, whch captures the Boolean smplcaton occurrng n the crcut Fnally, we compose the decomposton functons nto the of the output, to obtan the canoncal output In ths paper, we focus our attenton on the composton phase We dscuss and demonstrate varous heurstc algorthms to perform composton; theren les our contrbuton In Secton 3, we dscuss the basc dentons and termnology that we use throughout ths paper In Secton 4 we dscuss the decomposton procedure We descrbe our composton technques n Secton 5, and dscuss the results obtaned 1 Department of Electrcal Engneerng and Computer Scences, Unversty of Calforna, Berkeley, CA Fujtsu Laboratores of Amerca, San Jose, CA n Secton 7 We conclude wth Secton 8 where we summarze our contrbutons, and gve drectons for future research n ths area 2 Prevous Work Though BDDs have been researched for about four decades [10, 1], they found wdespread use only after Bryant [3] showed that such graphs, under some condtons, can be easly manpulated These condtons are that the graph s reduced (e no two nodes have dentcal subgraphs), and that a total orderng of the varables s enforced The resultng BDD s called a Bryant ntroduced two symbolc manpulaton procedures - apply and compose, to combne two dentcally ordered s Apply allows s to be combned under some Boolean operaton, and compose allows the substtuton of a varable wth a functon Another mportant development n ths area s the work on Dynamcal Varable Reorderng [14] Local alteratons are performed on the exstng varable order, and a change n the varable order s accepted f t results n a reduced manager sze Ths scheme was shown to requre reduced amounts of memory for most crcuts, at the cost of ncreased executon tme s are typcally constructed usng some varant of Bryant's apply procedure [3] The gates of the crcut are processed n a depth-rst manner untl the s of the desred output gate(s) are constructed However, an exclusvely bottom-up approach s often not the most computatonally ecent technque for constructng ROB- DDs, as dscussed n [8] The prmary focus of [8] was on ndng good decompostons Structural and functonal methods were proposed for ndng these decomposton ponts The functonal method was shown to have more exblty n choosng decomposton ponts and obtaned better results Accordngly,we use the functonal decomposton method n our work [8] dd not dscuss the process of composton; we focus our attenton on ths step We propose varous composton schemes and compare ther eectveness 3 Prelmnares In ths secton we provde the dentons and termnology for rest of the paper For detals on s, please refer to [2, 3, 4] For an ecent mplementaton of the package, [2] s an excellent reference Assume we are gven a crcut representng a boolean functon F F : B n! B o, wth n prmary nputs x 1 ;:::;x n, and o prmary outputs To smplfy the dscusson, we wll focus our attenton on a sngle output G Let G d ( ) represent the of G expressed n terms of a varable set = f 1 ; 2 ;:::; mg Each 2 has a correspondng, bdd, n terms of prmary nput varables as well as (possbly) other j 2, where j 6= Elements of can be ordered such that jbdd depends on only f <j These 2 are called decomposton ponts of G G d ( ) s the decomposed of G n terms of the decomposton ponts

2 The composton [3] of n G d ( ) s denoted by G d ( ):( bdd ) where G d ( ):( 1 bdd ) = bdd :G d ( ) + bdd :G d ( ) G d ( ) represents the restrcton of G d ( ) at =1,and s obtaned by drectng all the ncomng edges to the node wth varable d to ts = 1 branch G d ( ) s also referred to as the -cofactor of G d ( ) Other technques for composton have been proposed [12, 7]; for our purpose we wll consder the approach descrbed above 4 Decomposton Strategy We use the functonal decomposton technque reported n [8] We ntroduce a decomposton varable at ponts where the sze and / or the manager sze ncreases by a large measure s of the remanng crcut are now bult n terms of prmary nputs, prevously ntroduced decomposton varables as well as the newly ntroduced decomposton varable Accordngly, the of the output s bult n a decomposed manner In ths scheme no decomposton s performed when the functon can be processed wthout any memory exploson In our mplementaton, we decompose a functon when the total manager sze ncreases by more than a userspeced threshold, as a result of some Boolean operaton Ths check s only done f the manager sze s larger than a user-speced mnmum Addtonally, a decomposton pont s added when an ndvdual grows beyond another threshold value, also provded by the user Thus, a decomposton pont may be ntroduced when some operaton on the cubes wthn a node causes the threshold to be exceeded In ths case, there s no physcal correspondence between decomposton ponts and crcut nodes 5 Composton Strateges In ths secton we descrbe our algorthms for ndng good composton orders The correspondng to a new decomposton pont( bdd )mayhave n ts support set some j 's, where j<we store ths dependency nformaton n the form of a dependency graph After analyzng ths graph, we choose the best to be composed The choce of the to compose s made on the bass of some cost functon, whch tres to estmate the resultng graph sze after composton Once a varable s composed n G d,we update the dependency graph for subsequent compostons So the algorthm conssts of three man parts: Intalzng the dependency graph Selecton of the to be composed Updatng the dependency graph after composton In the followng secton we descrbe each of these steps n some detal 51 Intalzng the dependency graph The dependency graph s a drected acyclc graph For every decomposton pont (say ), there s a correspondng noden the dependency graph (node ) There s one addtonal node correspondng tog d, called node Gd There s an edge from node to node j f and only f s present n the support of jbdd Smlarly an edge from node to node Gd represents that G d depends on Ths graph s guaranteed to be acyclc snce there s an edge between node and node j only f j> If an edge goes from node to node j then node j s called the parent ofnode and node s called the chld of node j Anodenode s called the mmedate chld of node j f node 3 2 G d a) Before composng varable 4 b) After composng varable 4 Fgure 1: Dependency Graph, showng changes after an update s a chld of node j and no other path exsts between node and node j Fgure 1(a) shows a dependency graph Note that nodes 3, 4 and 5 are mmedate chldren of the G d node, whle 2 s not, even though t s a chld of G d 52 Cost Functon Heurstcs We mplement four separate heurstcs for cost functon evaluaton For every canddate varable that can be composed nto G d,we assgn a cost whch estmates the sze of the resultng composed The varable wth the lowest cost estmate s composed In all our heurstcs, the canddate nodes for composton are the mmedate chldren of G d Ths choce ensures that that a decomposton pont has to be composed only once n the nal graph and we never need more compostons than the cardnalty of the set of decomposton varables Ths results n the mnmum number of compostons to get the monolthc representaton of the target functon Wthout ths restrcton, the composton process wll need O(n 2 ) compostons n the worst case, where n s the number of decomposton ponts Snce composton s the most tme consumng operaton n the entre algorthm, ths reducton n the algorthm complexty s of sgncance Our four heurstcs are detaled below 521 Bound of the Sze of the Composed For any boolean operaton on s f 1 and f 2 t s well known that the resultng s bounded n sze by j f 1 j j f 2 j, where j f j represents the number of nodes n the of f Wth ths result, t s easy to show that the composed G d ( ):( bdd ) s bounded by j G d ( ) j 2 j bdd j Bryant conjectures n[3] that ths bound s actually j G d ( ) j j bdd j The sze of the composed j G d ( ):( bdd ) j s equal to j G d ( ) + G d ( ) j The sze of G d ( ) and G d ( ) are bounded by j G d j j bdd j Ths bound s strong for the product operaton If Bryant's conjecture s true, then the reason why the resultng composton doesn't blow up s that the OR operaton doesn't blow up If ths s the case then the bound for the sze of the composed would be (j G d ( ) j + j G d ( ) j) j bdd j We use ths bound as our rst cost functon to select the composton varable 3 2 G d 1 5

3 Make G d and -array Intalze the dependency graph whle (no of decomp ponts > 0) Select the mnmum cost mmedate chld of node Gd Compose the selected n G d Update the dependency graph repeat Fgure 2: Algorthm: Functonal Decomposton and Composton 522 Support Set Sze of the Composed It s beleved that the sze of a s postvely correlated to the cardnalty of the support set As our second cost functon, we use the ncrease n the support sze of the composed to select the decomposton pont to be composed We choose that decomposton varable whch leads to the smallest ncrease n the sze of the support set of the composed Ths method works well, as we wll see n the results secton 523 Sum of the szes of G d ( ), G d ( ) and In most cases, the product of szes of two functons as an estmate for the sze of ther resultng s very loose Instead of takng the products as the cost functon, we take the sum of the szes of the s as a measure of cost of composng a decomposton pont So we compose a varable whose estmate of j G d ( ) j + j G d ( ) j + j bdd j s mnmum In essence ths scheme favors varables whch have smaller bdd s and result n smaller cofactors G d ( ) and G d ( ) 524 Sze and Number of Occurrences of Our nal cost functon counts the number of nodes n G d that correspond to a varable Ths s a measure of the number of tmes each nstance of the composton wll have to be done on the graph, and s a reasonable estmate of the complexty of composng nto G d Ths count smultpled by the sze of bdd, whch serves as an estmate of the complexty of each nstance of composton It can be shown that f the supports of bdd and G d are dsjont, then bdd can be composed n G d by replacng all occurrences of n G d by bdd The resultng graph sze, n ths case, would be the same as the estmate 53 Updatng the dependency graph Suppose a decomposton pont,, s composed n kbdd Now the dependency graph needs to be updated Ths s done by removng the edge from node to node k and addng new edges from the chldren of node to the node k Also, f node (correspondng to ) does not fan out to any other node after composton then we remove node and all the edges enterng node Fgure 1(b) shows the result of composng 4bdd n G d In Secton 6 we dscuss the algorthm and mplementaton detals, ncludng the data structure used for the dependency graph 6 Algorthm and Implementaton Detals Fgure 2 shows the complete algorthm schematcally G d represents the decomposed verson of the output node n terms of prmary nputs and the decomposton varables The s correspondng to the decomposton ponts are stored n an array denoted by -array At the end of the decomposton procedure, we get the of the output n terms of prmary nputs and ntermedate varables s We also get an array contanng the bdd s The dependency graph s mantaned n the form of an adjacency matrx Ths matrx has n rows and (n+1) columns where n s the number of decomposton ponts ntroduced durng the bottom-up phase of the algorthm Ths s a 0,1 matrx A \1" bt present n th row and j th column, where 1 ; j n ndcates that jbdd depends on A \1" entry n the th row and (n +1) th column ndcates that G d depends on By lookng at the support set of bdd 's and G d we can easly ntalze the dependency graph To check whether a gven s the mmedate chld of G d, we need to check f the (; (n + 1)) th entry s a \1" and all the other entres n the th row are \0"s To update the graph after s composed n G d,wechange the (; n +1)entry to a \0", and for rows havng a non-zero th column entry,wechange the th column entry to \0" and (n +1) th column entry to \1" 7 Results We mplemented the algorthms n the C language, under the SIS [15] programmng envronment Our results were run on a DECsystem 5000/260, wth 440MB memory We ran our experments on the ISCAS85 benchmark crcuts, for outputs whch are consdered hard for tradtonal packages [15] In the tables below, COMP-SIZE corresponds to the method whch estmates cost by the bound on the sze of the composed shown n Secton 521 SUP-SIZE refers to the support set heurstc of Secton 522, whle SUM-SIZE uses the sze estmate of Secton 523 for the composed NUM-PSI uses the number of occurrences of varable n G d tmes the sze of bdd as the cost functon (Secton 524) The Reference entry represents the tradtonal apply based method of buldng s For each scheme, we havetwo sets of experments In the rst set, we use Natural Orderng wth and wthout Dynamc Varable Reorderng [14] These results are summarzed n Tables 1 and 3 The results wth Dynamc Varable Reorderng are shown under the headng 'DR' The second set of experments uses Malk's Orderng [11] These results are presented n Tables 2 and 4 Tables 1 and 2 report the maxmum sze of the manager at any gven pont n the computaton In these tables, the SUP-SIZE heurstc does well n almost all cases on average For some examples, NUM-PSI outperforms SUP-SIZE under Malk's Orderng and DR On average, NUM-PSI and SUP-SIZE perform better than the other methods The reason for ths s that SUP-SIZE requres just two support set computatons, and NUM-PSI requres the number of nodes of the varable presentng d No cofactor operatons are needed for calculatng the cost, as s the case n COMP-SIZE and SUM- SIZE, where the computaton of postve and negatve cofactors of G d wth the varable under consderaton ncreases the total memory usage Tables 3 and 4 report the total runtme for each example Wthout DR, SUP-SIZE and NUM-PSI are about as fast and are much faster than the other two schemes Ths s prmarly due to the derence n the tme taken for cost estmaton [13] In COMP-SIZE and SUM-SIZE, we actually take the cofactors of G d for estmatng the cost Ths s a tme consumng process, requrng the allocaton of new nodes Wth DR, the tme taken by reorderng s the domnatng factor, hence none

4 of the scheme performs consstently better n the presence of DR 8 Conclusons The man conclusons of our work are as follows: Our method performs better than the tradtonal apply based scheme, and s also able to buld the s of functons that the tradtonal scheme fals on We showed that the ntermedate memory requrement s very senstve to the order of composton A bad order of composton may utlze up to twce the memory of a good order We showed that SUP-SIZE and NUM-PSI are reasonably good heurstcs for gudng the composton process The peak memory requrement usng these schemes s generally lower than the tradtonal method as well as other composton methods Under Dynamc Varable Reorderng, none of the schemes performs consstently better than the others n runtme Ths s because Dynamc Varable Reorderng s the domnatng factor n the runtme In the future, we plan to use ths approach to reduce the resources requred n computng transton relatons, reachablty, and also for alternate BDD approaches, ncludng FDDs [9], OKFDDs [5], Typed-Free BDDs [6] and probablstc vercaton as n [7] 9 Acknowledgements Ths work was supported by the Calforna State Mcro Contracts and References [1] Sheldon B Akers Bnary decson dagrams IEEE Transactons on Computers, C-27:509{516, June 1978 [2] K S Brace, R L Rudell, and R E Bryant Ecent Implementaton of a BDD Package In Proc of the Desgn Automaton Conf, pages 40{45, June 1990 [3] R E Bryant Graph based algorthms for Boolean functon representaton IEEE Transactons on Computers, C-35:677{690, August 1986 [4] R E Bryant Symbolc boolean manpulaton wth ordered bnary decson dagrams ACM Computng Surveys, 24:293{318, September 1992 [5] R Drechsler, A Sarab, M Theobald, B Becker, and M A Perkowsk Ecent representaton and manpulaton of swtchng functons based on ordered kronecker functonal decson dagrams 31st Desgn Automaton Conference, pages 415{419, 1994 [6] J Gergov and Ch Menel Ecent analyss and manpulaton of typed free bdds can be extended to read-once-only branchng programs Tech Report 92-10, Unversty of Trer Also to appear n IEEE Transacton on Computers, June 1995, 1992 [7] J Jan, J Btner, D S Fussell, and J A Abraham Probablstc vercaton of Boolean functons Formal Methods n System Desgn, 1, 1992 [8] J Jan, A Narayan, C Coelho, S Khatr, A Sangovann- Vncentell, R Brayton, and M Fujta Combnng Topdown and Bottom-up Approaches for Constructon Techncal Report UCB/ERL M95/30, Electroncs Research Lab, Unv of Calforna, Berkeley, CA 94720, Aprl 1995 [9] U Kebschull, E Schubert, and W Rosenstel Multlevel logc synthess based on functonal decson dagrams European Desgn Automaton Conference, pages 43{47, 1992 [10] C Y Lee Representaton of swtchng crcuts by bnarydecson programs Bell Syst Tech J, 38:985{999, 1959 [11] S Malk, A R Wang, R K Brayton, and A Sangovann- Vncentell Logc Vercaton usng Bnary Decson Dagrams n a Logc Synthess Envronment In Proc of the Intl Conf on Computer-Aded Desgn, pages 6{9, November 1988 [12] K L McMllan Symbolc model checkng: An approach to the state exploson problem PhD Thess, Dept of Computer Scences, Carnege Mellon Unversty, 1992 [13] A Narayan, S P Khatr, J Jan, M Fujta, R K Brayton, and A Sangovann-Vncentell Compostonal Technques for Mxed Bottom-Up / Top-Down Constructon of ROB- DDs Techncal Report UCB/ERL M95/51, Electroncs Research Lab, Unv of Calforna, Berkeley, CA 94720, June 1995 [14] R L Rudell Dynamc Varable Orderng for Ordered Bnary Decson Dagrams In Proc of the Intl Conf on Computer-Aded Desgn, pages 42{47, November 1993 [15] E M Sentovch, K J Sngh, L Lavagno, C Moon, R Murga, A Saldanha, H Savoj, P R Stephan, R K Brayton, and A L Sangovann-Vncentell SIS: A System for Sequental Crcut Synthess Techncal Report UCB/ERL M92/41, Electroncs Research Lab, Unv of Calforna, Berkeley, CA 94720, May 1992

5 # no DR DR no DR wth DR no DR DR no DR DR no DR DR C C C C { { { { { C C C C { { Table 1: Max Manager Sze, Natural Orderng, 1M lmt # no DR DR no DR wth DR no DR DR no DR DR no DR DR C C C C C { { { { { C C C { { { Table 2: Max Manager Sze, Malk Orderng, 1M lmt # no DR DR no DR wth DR no DR DR no DR DR no DR DR C C C C { { { { { C C C C { { Table 3: Total Tme (sec), Natural Orderng, 1M lmt # no DR DR no DR wth DR no DR DR no DR DR no DR DR C C C C C { { { { { C C C { { { Table 4: Total Tme (sec), Malk Orderng, 1M lmt

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

The Multiple Variable Order Problem for Binary Decision Diagrams: Theory and Practical Application

The Multiple Variable Order Problem for Binary Decision Diagrams: Theory and Practical Application The Multple Varable Order Problem for Bnary Decson Dagrams: Theory and Practcal Applcaton Chrstoph Scholl Bernd Becker Andreas Brogle Insttute of Computer Scence Albert Ludwgs Unversty D 9110 Freburg m

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Compositional Techniques for Mixed Bottom-UpèTop-Down. Construction of ROBDDs

Compositional Techniques for Mixed Bottom-UpèTop-Down. Construction of ROBDDs Compositional Techniques for Mixed Bottom-UpèTop-Down Construction of ROBDDs Amit Narayan 1 èanarayan@ic.eecs.berkeley.eduè Sunil P. Khatri 1 èlinus@ic.eecs.berkeley.eduè Jawahar Jain 2 èjawahar@æa.fujitsu.comè

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

O n processors in CRCW PRAM

O n processors in CRCW PRAM PARALLEL COMPLEXITY OF SINGLE SOURCE SHORTEST PATH ALGORITHMS Mshra, P. K. Department o Appled Mathematcs Brla Insttute o Technology, Mesra Ranch-8355 (Inda) & Dept. o Electroncs & Electrcal Communcaton

More information

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams Analyss of Non-coherent Fault Trees Usng Ternary Decson Dagrams Rasa Remenyte-Prescott Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England R.Remenyte-Prescott@lboro.ac.uk

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su Stener Problems on Drected Acyclc Graphs Tsan-sheng Hsu y, Kuo-Hu Tsa yz, Da-We Wang yz and D. T. Lee? September 1, 1995 Abstract In ths paper, we consder two varatons of the mnmum-cost Stener problem

More information

Intra-procedural Inference of Static Types for Java Bytecode 1

Intra-procedural Inference of Static Types for Java Bytecode 1 McGll Unversty School of Computer Scence Sable Research Group Intra-procedural Inference of Statc Types for Java Bytecode 1 Sable Techncal Report No. 5 Etenne Gagnon Laure Hendren October 14, 1998 w w

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Steve Setz Wnter 2009 Qucksort Qucksort uses a dvde and conquer strategy, but does not requre the O(N) extra space that MergeSort does. Here s the

More information

Improved Symoblic Simulation By Dynamic Funtional Space Partitioning

Improved Symoblic Simulation By Dynamic Funtional Space Partitioning Improved Symoblc Smulaton By Dynamc Funtonal Space Parttonng Tao Feng, L-.Wang, Kwang-Tng heng Department of EE, U-Santa Barbara, U.S.A tfeng,lcwang, tmcheng @ece.ucsb.edu Andy -. Ln adence Desgn Systems,

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Bran Curless Sprng 2008 Announcements (5/14/08) Homework due at begnnng of class on Frday. Secton tomorrow: Graded homeworks returned More dscusson

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an On Central Spannng Trees of a Graph S. Bezrukov Unverstat-GH Paderborn FB Mathematk/Informatk Furstenallee 11 D{33102 Paderborn F. Kaderal, W. Poguntke FernUnverstat Hagen LG Kommunkatonssysteme Bergscher

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Augmented Sifting of Multiple-Valued Decision Diagrams

Augmented Sifting of Multiple-Valued Decision Diagrams Augmented Sftng of Multple-Valued Decson Dagrams D. Mchael Mller Rolf Drechsler Department of Computer Scence Insttute of Computer Scence Unverst of Vctora Unverst of Bremen Vctora, BC 28359 Bremen CANADA

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

Dijkstra s Single Source Algorithm. All-Pairs Shortest Paths. Dynamic Programming Solution. Performance. Decision Sequence.

Dijkstra s Single Source Algorithm. All-Pairs Shortest Paths. Dynamic Programming Solution. Performance. Decision Sequence. All-Pars Shortest Paths Gven an n-vertex drected weghted graph, fnd a shortest path from vertex to vertex for each of the n vertex pars (,). Dstra s Sngle Source Algorthm Use Dstra s algorthm n tmes, once

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

Hybrid Heuristics for the Maximum Diversity Problem

Hybrid Heuristics for the Maximum Diversity Problem Hybrd Heurstcs for the Maxmum Dversty Problem MICAEL GALLEGO Departamento de Informátca, Estadístca y Telemátca, Unversdad Rey Juan Carlos, Span. Mcael.Gallego@urjc.es ABRAHAM DUARTE Departamento de Informátca,

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011 9/8/2 2 Outlne Appendx C: The Bascs of Logc Desgn TDT4255 Computer Desgn Case Study: TDT4255 Communcaton Module Lecture 2 Magnus Jahre 3 4 Dgtal Systems C.2: Gates, Truth Tables and Logc Equatons All sgnals

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

A SAT-BASED BOUNDED MODEL CHECKER FOR CONCURRENT ASSEMBLY PROGRAMS. Guodong Li, Ganesh Gopalakrishnan, Konrad Slind

A SAT-BASED BOUNDED MODEL CHECKER FOR CONCURRENT ASSEMBLY PROGRAMS. Guodong Li, Ganesh Gopalakrishnan, Konrad Slind A SAT-BASED BOUNDED MODEL CHECKER FOR CONCURRENT ASSEMBLY PROGRAMS Guodong L, Ganesh Gopalakrshnan, Konrad Slnd School of Computng, Unversty of Utah lgd@cs.utah.edu ABSTRACT A SAT-based bounded model checker

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface. IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

A Concurrent Non-Recursive Textured Algorithm for Distributed Multi-Utility State Estimation

A Concurrent Non-Recursive Textured Algorithm for Distributed Multi-Utility State Estimation 1 A Concurrent Non-ecursve Textured Algorthm for Dstrbuted Mult-Utlty State Estmaton Garng M. Huang, Senor Member, IEEE, and Jansheng Le, Student Member, IEEE Abstract: Durng power deregulaton, power companes

More information

(1) The control processes are too complex to analyze by conventional quantitative techniques.

(1) The control processes are too complex to analyze by conventional quantitative techniques. Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

A One-Sided Jacobi Algorithm for the Symmetric Eigenvalue Problem

A One-Sided Jacobi Algorithm for the Symmetric Eigenvalue Problem P-Q- A One-Sded Jacob Algorthm for the Symmetrc Egenvalue Problem B. B. Zhou, R. P. Brent E-mal: bng,rpb@cslab.anu.edu.au Computer Scences Laboratory The Australan Natonal Unversty Canberra, ACT 000, Australa

More information

Abstract Ths paper ponts out an mportant source of necency n Smola and Scholkopf's Sequental Mnmal Optmzaton (SMO) algorthm for SVM regresson that s c

Abstract Ths paper ponts out an mportant source of necency n Smola and Scholkopf's Sequental Mnmal Optmzaton (SMO) algorthm for SVM regresson that s c Improvements to SMO Algorthm for SVM Regresson 1 S.K. Shevade S.S. Keerth C. Bhattacharyya & K.R.K. Murthy shrsh@csa.sc.ernet.n mpessk@guppy.mpe.nus.edu.sg cbchru@csa.sc.ernet.n murthy@csa.sc.ernet.n 1

More information

Floating-Point Division Algorithms for an x86 Microprocessor with a Rectangular Multiplier

Floating-Point Division Algorithms for an x86 Microprocessor with a Rectangular Multiplier Floatng-Pont Dvson Algorthms for an x86 Mcroprocessor wth a Rectangular Multpler Mchael J. Schulte Dmtr Tan Carl E. Lemonds Unversty of Wsconsn Advanced Mcro Devces Advanced Mcro Devces Schulte@engr.wsc.edu

More information

A Power Optimization Toolbox for Logic Synthesis and Mapping

A Power Optimization Toolbox for Logic Synthesis and Mapping A Power Optmzaton Toolbox for Logc Synthess and Mappng Alan Mshchenko Robert Brayton Stephen Jang Kevn Chung Department of EECS, Unversty of Calforna, Berkeley LogcMll Technology Qualcom Innovatons {alanm,

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations*

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations* Confguraton Management n Mult-Context Reconfgurable Systems for Smultaneous Performance and Power Optmzatons* Rafael Maestre, Mlagros Fernandez Departamento de Arqutectura de Computadores y Automátca Unversdad

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Dijkstra s Single Source Algorithm. All-Pairs Shortest Paths. Dynamic Programming Solution. Performance

Dijkstra s Single Source Algorithm. All-Pairs Shortest Paths. Dynamic Programming Solution. Performance All-Pars Shortest Paths Gven an n-vertex drected weghted graph, fnd a shortest path from vertex to vertex for each of the n vertex pars (,). Dkstra s Sngle Source Algorthm Use Dkstra s algorthm n tmes,

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information