An Efficient Algorithm for the Physical Mapping of Clustered Task Graphs onto Multiprocessor Architectures
|
|
- Paula Richardson
- 6 years ago
- Views:
Transcription
1 An Effiient Algorithm for the Physil Mpping of Clustere Tsk Grphs onto Multiproessor Arhitetures Netrios Koziris Pnyiotis Tsnks Mihel Romesis George Ppkonstntinou Ntionl Tehnil University of Athens Dept. of Eletril n Computer Engineering Computer Siene Division Computing Systems Lortory Zogrfou Cmpus, Zogrfou 15773, Greee e-mil: {nkoziris, mromes}@sl.ee.ntu.gr Astrt The most importnt issue in sequentil progrm prllelistion is the effiient ssignment of omputtions into ifferent proessing elements. In the pst, too mny pprohes were evote in effiient progrm prlleliztion onsiering vrious moels for the prllel progrms n the trget rhitetures. The most wiely use prllelism esription moel is the tsk grph moel with preeene onstrints. Nevertheless, s fr s physil mpping of tsks onto prllel rhitetures is onerne, little reserh hs given prtil results. It is well known tht the physil mpping prolem is NP-hr in the strong sense, thus llowing only for heuristi pprohes. Most reserhers or tool progrmmers use exhustive lgorithms, or the lssil metho of simulte nneling. This pper presents n lterntive pproh onto the mpping prolem. Given the grph of lustere tsks, n the grph of the trget istriute rhiteture, our heuristi fins mpping y first pling the highly ommunitive tsks on jent noes of the proessor network. One these «kone» tsks re mppe, there is no ktrking, thus hieving low omplexity. Therefore, the remining tsks re ple eginning from those lose to the «kone» tsks. The pper onlues with performne n omprison results whih revel the metho s effiieny. 1. Introution In the lst yers the evolution in the fiels of VLSI tehnology n omputer networking hs given rise to the utiliztion of istriute omputing systems. Distriute omputers re ttrtive to mny emning pplitions sine they provie the user with moulrity, slility n low ost eentrlize proessing power. Nevertheless istriute omputing hs soun rwk whih isourges pplition evelopers to use it. The existene of mny prllel proessors is not fully exploite euse of the interproessor ommunition overhe. The egrtion of optiml speeup when the numer of proessors inreses is use y the exessive sometimes mount of messges etween non-neighoring ells. Reserhers hve lrey fouse on suh lowperformne prolems n propose vrious methoologies to the optiml prlleliztion of the given progrms. Experiene hs shown tht n effetive solution to the generl tsk grph sheuling prolem onto given rhiteture is multistep pproh whih inlues the tsk grph esription of the prolem, effiient sheuling of the tsks onto virtul fully onnete prllel mhine, merging tsks into lrger lusters n finlly ssigning lusters into the physil proessor topology. As fr s the tsk grph sheuling with preeene onstrints is onerne, the most wiely use moel is the irete yli grph with eges n noes hving vrious weights. Noe weights represent omputtion time for the orresponing tsks, while ege weights re ommunition requirements etween tsks. Eh ege iretion gives set of preeene onstrints whih shoul e preserve. The generl tsk grph sheuling prolem with ommunition elys is NP-COMPLETE s presente in [9]. Srkr [10], Gersoulis n Yng [3] presente goo heuristis for solving the tsk grph sheuling prolem with ritrry ommunition osts. All previous reserhers were supposing unoune or oune numer of proessors with CLIQUE topology.
2 This hypothetil topology is fr wy from the relisti se. Moern istriute memory prllel systems re orgnize in ifferent topologies, inluing hyperue, mesh or ring rhitetures. There is strong nee for effiient plement of lustere tsks into the rel proessor network. The mpping of virtul into rel topologies is lle the physil mpping prolem or the tsk llotion prolem. The tsk llotion prolem n e optimlly solve in speil ses suh s two-proessor istriute systems, or liner rry of ny numer of proessors. If the trget rhiteture ontins two proessors, then the tsk llotion prolem is stte s mximum flow minimum ut prolem [11] whih n e polynomilly solve using, for exmple, the For-Fulkerson lgorithm. There lso exists heuristi presente [7], whih resses the generl m-proessor prolem using the 2-wy min ut lgorithm m times. Most of the theoretil work on mppings onsiers struture grphs like gris, hyperues, trees, et [8]. An inresing numer of pplitions emn methos eling with irregulr grphs. The generl mpping prolem is unfortuntely NP-omplete, thus llowing only for effiient heuristis. Our pper els with the intrtle prolem of luster llotion onto prllel rhitetures, y proposing n lterntive pproh to the ove mentione methoologies. We moel ny trget prllel rhiteture y non-irete grph with unitry ege weights only. This representtion retins the meningful only etils of the trget. Next, the grph of tsks is epite s nonirete grph with vrious ege osts n noe weights resulting from lustering heuristis s the one propose y Gersoulis in [3]. The tsk ssignment proeure strts y tring the lusters whih re most likely to e ple in neighoring ples, where the mximum numer of links is ville. This step ens y pling these kone lusters into these ples. For eh of the kone lusters, the lgorithm retes sets of neighoring lusters whih re nite for plement into the jent ells of every pressigne kone luster. The lgorithm ens when ll lusters re ssigne. In the reminer of this pper the following re presente n further elorte: Setion II reviews the multistep pproh of tsk grph sheuling with preeene onstrints using speifi topology istriute rhiteture. Setion III presents the propose grph moel for the prllel rhiteture n the utilize ost funtion for evluting ifferent physil mppings. In setion IV we outline the steps of the propose lgorithm. Finlly setion V the propose lgorithm is ompre to other pprohes in terms of effiieny n the outperforming results re shown. 2. The Multistep Approh The generl sheuling prolem of n ritrry tsk grph with ommunition elys onto fixe size n onnetion pttern istriute rhiteture is NP- COMPLETE. El-Rewini et H. Ali in [1], [2] prove this NP ompleteness y representing the prolem of tsk llotion onto istriute system with split grph. The tsk llotion is therefore equivlent to weighte lique grph prtitioning whih is NP-COMPLETE, thus proving inherent intrtility. In orer to fin effiient methos, reserhers hve followe multistep pproh, where eh step resses limite instne of the generl prolem. The suessive steps re outline s follows: tsk lustering, luster merging n physil mpping Tsk Clustering - Sheuling tsk grph with ommunition elys onto oune/unoune CLIQUE of proessors. First the tsk grph with omputtion/ommunition osts n preeene onstrints is sheule onto fully onnete network of proessors. The lssil CLIQUE rhiteture is therefore use s trget hving limite or unlimite numer of proessors [4]. Reserhers, in this first step, propose lgorithms whih minimize the mximum mkespn, isregring the tul proessor s topology. Even when the mkespn metri is to e minimize, the sheuling prolem remins NP- COMPLETE in the mjority of generl ses. Ppimitriou et Ynnkkis in [9] hve prove tht the lssil sheuling prolem of tsk grph with ritrry ommunition n omputtion times is NP- COMPLETE. They propose 2-optiml pproximtion lgorithm. In ition to this, Srkr in [10], Gersoulis in [3] propose fster heuristis with eptle performne. All these lgorithms perform the sme initil step: Cluster the tsks into lrge noes, so tht the grin of the prllelism is inrese n the use of istriute proessors is minimizing the tsk grph mkespn. The resulting topology, y pplying this initil step is grph of lusters. Insie every luster there exist severl tsks whih re time sheule in the sme proessor n hve zero intrommunition overhe. As fr s lusters interommunition is onerne, this is the summtion over ll tsks interommunition overhe for ll lusters. This orgnises the set of tsks into lusters with the following property: Eh luster ontins ll tsks whih re to e exeute on the sme proessor. This step is lle tsk lustering.
3 2.2. Cluster Merging into p physil lusters In this step, the set of lustere tsks is mppe onto lique of oune numer of proessors. Sine the set of lustere tsks is lrger thn the numer of ville proessors, this step ssigns two or more lusters to the sme proessor. Srkr in [10] hs propose sheuling heuristi with O( V ( V + E )) omplexity, where V stns for the numer of noes n E for the numer of eges. A lower omplexity heuristi whih is use in PYRROS [12] is the work profiling metho. It merges lusters whih hve pproximtely the sme rithmeti lo Physil Mpping of p physil lusters onto p network onnete proessors. While so muh effort hs een one onerning the first steps, the finl step of luster llotion onto the physil proessor topology hs not given onsierle ttention. Few reserhers suh s Bokhri hve presente some heuristis. Mny sheuling tools whih suh s OREGAMI or PYRROS or PARALLAX use heuristis or pproximtion lgorithms whih re sometimes effiient. For exmple Gersoulis et Yng in Pyrros [12] use Bokhri s heuristi whih is se onto simulte nneling. This lgorithm strts from n initil ssignment, then performs series of pirwise interhnges y reuing the ost funtion n stops fter O(p 3 ) steps. In Oregmi s [6] MAPPER, tool for tsk llotion onto istriute rhitetures, greey heuristi is use, lle the NN-Eme. It urrently supports only mesh n hyperue proessor networks thus limiting its potentil use. Even in the se of those two rhitetures, it uses rther simple metho, y listing ll eges in sening orer of their weights n ssigning them to the proessor s network eges The NN-Eme Algorithm Given tsk grph, it first onstruts list of ll the eges in the grph, sorte y weight. The heuristi then trverses this list in liner time n for eh ege, ssign enpoints s follows: If oth noes hve lrey een ssigne, o nothing If only one noe hs een ssigne, then ssign the other noe to the losest free proessor If neither noe hs een ssigne, rnomly hoose free proessor n ssign one noe to it n the other to its losest free neighor. The sorting step nees O( E log E ) time, n the rest is O( E ). It is fst heuristi, ut it is limite to hyperue n mesh topologies. Oviously, it hs poor performne in mny ses euse it is se on single-ege jeny, n it oes not tke into ount ny set of jent noes. In Exmple 5, we pply oth our metho n the NN-Eme, n the outperforming results of the propose heuristi re shown. In PARALLAX [5], ll tsk llotion heuristis ssume fully onnete networks of proessors. Only the mpping heuristi onsiers ritrry proessor interonnetion topology. It uses moifie list sheuling tehnique with priorities, y tking into ount the ommunition elys. The noe s priority in the list is its level. In [8], Monien n Suorough reviewe results on mpping speifi tsk grphs into the most populr prllel rhitetures. 3. Grph Moels Our prolem onsiers two grphs: The grph of virtul proessors, or equivlently the grph of lustere tsks, efine s G (V, E ) n the grph of physil proessors, efine s G p (V p, E p ). Definition 3.1: Consier two grphs n G w (V w, E w ) where V is the set of noes n E is the set of eges with V w = V p, we efine the following funtion F m :V w V p s the physil mpping funtion : v w,v w V w with (v w,v w ) E w, (F m (v w ),F m (v w )) E p Let us efine some topologil prmeters for the proessor grph/network: Hop is the unit istne etween ny two iretly onnete proessors in the network Distne etween two proessor noes u n v is lle the numer of hops in the shortest pth onneting u n v. Distne is represente y ist(u,v). The following formul efines the ost funtion use to evlute the ifferent mppings: Cost Funtion for mpping F m : CF(F m ) = ist(f m (v w ), F m (u w ) )xomm(v w, u w ) Y X ( Z Z Z where: ist( F m (v w ), F m (u w ) ) is the shortest pth in the proessor grph etween the 2 proessors-noes where the tsks v w n u w re mppe. omm(v w, u w ) is the totl ommunition ost etween the tsks v w,u w The following properties hrterize the effiieny of mpping from G w to G p : Ege-iltion is the mximum istne in G p n ege of G w hs to e route. Formlly:
4 Ege-ongestion is the mximum numer of eges from G w route vi n ritrry ege (or noe) of G p In most theoretil works eling with the physil mpping prolem, minimizing ege iltion n ege ongestion re the primry gols. Our ojetive is therefore to fin the mpping F m whih minimizes CF m, or formlly: opt Definition 3.2: A mpping F m with respet to Cost Funtion CF() is lle optiml if: CF(F opt m ) = min { CF(F m ) F m MAP}, where MAP is the set of ll possile mppings 3.1. Exmple Consier the G (V,E ) with ij osts shown in figure 1, n the proessor grph G p (V p,e p ): Figure 4: Mpping F M1 CF M1 = 2 + 4X = Figure 5: Mpping F M2 G C Figure 1. The Cluster Grph 1 2 CF M2 = 4 + 2X X2 = 21 Oviously, F m1 is etter thn F m2 in terms of totl ompletion time, sine it imposes less ommunition overhe thn F m2. The lest ommunition is hieve y mpping F m3 shown elow: G P 3 4 Figure 2 : The trget rhiteture 1 2 Figure 6: Optiml Mpping F M3 CF m3 = x3 = Figure 3: CLIQUE rhiteture Oviously there exist 4! lterntive mppings whih n e foun y exhustive serh. For exmple, onsier the following lterntive mppings n evlute the orresponing ost funtion CF m (): 4. The Physil Mpping Algorithm (PMAP) This heuristi tries to fin the most ommunition intensive tsk-noes n mp them n their neighors into neighoring proessing noes on the proessor grph. At the eginning, the proessor grph is nlyze n, for eh noe, the numer of jent noes is lulte. Susequently, the noes of the tsk grph re sorte y sening orer of their totl ommunition weight n numer of neighors. The heuristi then ples the most emning tsk-noes in terms of totl ommunition links n ost to the respetive noes of the proessor grph. One these ore tsk noes re ple, there is no ktrking. Next, the heuristi ples the jent of the
5 ore noes to jent ells of the proessor grph, y mking lolly est-fit omprisons. The lgorithm performs the following steps: 4.1. First Phse: 1 st step: Ajust the mximum numer of neighors in the tsk-grph to the mximum numer in the proessor grph, y removing the less ommunition ost eges for eh tsk-noe. 2 n step: Sort the noes of the proessor grph y sening orer of their neighoring links n the noes in the luster grph G y the numer of ommunition links they nee. 3 r step: Assign the most emning tsk-noe to the est suitle noe of the proessor grph n his neighoring noes to the est suitle neighoring noes of the proessor grph Seon Phse: 4 th step: Ple k the eges remove t the first step. 5 th step: From the proessors not llote yet fin the one who neighors with the most proessors lrey ssigne. 6 th step: Fin tsk tht is istne y t most i (t the eginning i=1) from ll the tsks tht re mppe to the neighoring proessors of the proessor foun on the previous step. If foun ssign this tsk to the proessor of the 5 th step. 7 th step: Repet steps 5-6 until no more ssignments n e me. If there re more proessors to e llote, inrese i y one n go k to the 5 th step Detils of the lgorithm 1 st Phse: Ajust_neighors(G ); Aj(v) = {u: (u,v) E } /* Plement of the most ommunition ostful noe */ fin v G : rnk(v ) = mx rnk(v) fin v p G p : rnk(v p) = mx rnk(v) F m(v ) = v p; /* Plement of neigors to neigoring ells */ while Aj(v p) egin fin v : rnk(v ) = mx rnk (v ) Aj(v ) = Aj(v )-{v } fin v p : rnk(v p) = mx rnk (v p) F m(v ) = v p PROCS_ALLOC = PROCS_ALLOC {v p} PROCS_LEFT = PROCS_LEFT-{v p} TASKS_LEFT = TASKS_LEFT-{v } en 2 n phse: /* Plement of ll other noes */ Ple_k_eges; i=1 while PROCS_LEFT egin ssigning=flse for ll u PROCS_LEFT egin fin u Aj(u) PROCS_ALLOC = mx NEIGH = { v i: F m (v i) (Aj(u) PROCS_ALLOC)} /*set of tsks whih hve lrey een ssigne to neighoring pros*/ Aj(1,v i)=aj(v i) Aj(i,v i)=aj(i-1, v i) {u:(u,w) E C,w Aj(i-1,v i)} let CAND= Aj(i,v i) TASKS_LEFT if CAND egin fin v n : rnk(v n) = mx rnk (v), v CAND F m(u)=v n PROCS_LEFT=PROCS_LEFT-{u}; PROCS_ALLOC = PROCS_ALLOC {u}; TASKS_LEFT = TASK_LEFT-{v n} ssigning=true en en /* of for*/ if ssigning=flse then i=i+1 /* i inreses when uring the previous yle there hs een no ssignment */ en Ajust_neighors routine: neigh_r=mx Aj(v), v G p For eh v G : Aj(v) > neigh_r repet fin u Aj(v): omm(v, u) = min omm(v, w) w Aj(v) Aj(v)=Aj(v)-u until Aj(v) = neigh_r en of for; 5. Exmple Consier the G (V, E ) with ij osts shown in figure 7, n the proessor grph G p (V p,e p ) in figure 8: g Figure 7: The Cluster Grph for Exmple e 4 h 5 2 f
6 Figure 8: The trget rhiteture for Exmple 5.1.First Phse Sine # of Neighors of > mx Neigh we just the tsk grph y eleting eges : (,h) = 1, (, e) = 2. Tsk # of Neighors Totl rnking omm e f g h Tle 1: Sttsistis for the tsk grph V p =1,V =f F m (f)=1 Aj(f)={, e, h } F m ()=2 F m (e)=3 F m (h)=5 TASKS_LEFT={,,,g} 1f e h Figure 9: Assignments fter the 1 st phse 5.2 Seon Phse: insert k eges : (,h)=1,(,e)=2 1 st yle i=1 u 1 =4, Aj(4) PROCS_ALLOC = 2 u 2 =6, Aj(6) PROCS_ALLOC = 2 u 3 =7, Aj(7) PROCS_ALLOC = 2 u 4 =8, Aj(8) PROCS_ALLOC = 0 Let u = 4: NEIGH = {,e} CAND=Aj() Aj(e) TASKS_LEFT= Let u = 6: NEIGH={,h} CAND=Aj() Aj(h) TASKS_LEFT={g} F m (g)=6 2 n yle i=1 u 1 =4, Aj(4) PROCS_ALLOC =2 u 2 =7, Aj(7) PROCS_ALLOC =2 u 3 =8, Aj(8) PROCS_ALLOC =1 Let u = 4: NEIGH = {,e} CAND =Aj() Aj(e) TASKS_LEFT= Let u = 7: NEIGH = {h,e} CAND=Aj(h) Aj(e) TASKS_LEFT= Let u = 8: NEIGH={g} CAND=Aj(g) TASKS_LEFT= No ssignment uring this yle: i inreses y one 3 r yle i=2 u 1 =4, Aj(4) PROCS_ALLOC =2 u 2 =7, Aj(7) PROCS_ALLOC =2 u 3 =8, Aj(8) PROCS_ALLOC =1 Let u = 4: NEIGH = {,e} CAND = Aj(2,) Aj(2,e) TASKS_LEFT = {,} F m ()=4 4 th yle i=2 u 1 =7, Aj(7) PROCS_ALLOC =2 u 2 =8, Aj(8) PROCS_ALLOC =2 Let u = 7: NEIGH = {h,e} CAND=Aj(2,h) Aj(2,e) TASKS_LEFT = Let u = 8: NEIGH= {,g} CAND=Aj(2,) Aj(2,g) TASKS_LEFT = No ssignment uring this yle: i inreses y one 5 th yle i=3 u 1 =7, Aj(7) PROCS_ALLOC =2 u 2 =8, Aj(8) PROCS_ALLOC =2
7 Let u = 7: NEIGH={h, e} CAND=Aj(3,h) Aj(3,e) TASKS_LEFT={,} F m ()=7 F m ()=8 5h 6g 1f 3e Figure 10: Assignments fter the 2 n phse PMAP result 5.3. NN-Eme lgorithm 8 6. Performne Results We report our experiments on the PMAP lgorithm. For the ske of omprisons we hve rete progrm whih, given the tsk n the proessor grphs, genertes ll possile mppings n lultes the totl ommunition time se on the metri of setion III. We hve lso rete rnom tsk grph genertor with vrious ommunition-ege weights n numer of tsksnoes n grph genertor se on fixe topologies. We hve lso pplie the PMAP heuristi n the NN_Eme heuristi on the sme grph pirs. The results otine re shown in the tle elow. We n see tht the PMAP lgorithm gives etter results thn the NN_Eme lgorithm, espeilly when the tsk n proessor grphs hve fixe topologies. But even when the grphs hve een rnomly rete PMAP outperforms NN-Eme y more thn 10%. Sorting of Eges in esening orer of their weight: Noes Tsk topology Proessor topology PMAP vs. NN_Eme optiml vs. NN_Eme (e,f) 5 (,) 2 (,) 4 (,e) 2 (,f) 4 (g,h) 2 (,) 3 (h,f) 2 (g,) 3 Tle 2: Weight of eges Assign (e,f) ege to n ritrry ege, e.g: F m (e)=1, F m (f)=5 Assign (,) ege to n ritrry ege, e.g: F m ()=2, F m ()=6 Assign (,f) ege: Sine f is lrey ssigne, ssign to the losest free neighor: F m ()=7 All noes of (,) re ssigne. Assign (g,) ege: Sine is lrey ssigne, ssign g to the losest free neighor: F m (g)=3 Assign (,) ege: Sine is lrey ssigne, ssign to the losest free neighor: F m ()=8 All noes of (e,) re ssigne. Assign (g,h) ege: Sine g is lrey ssigne, ssign h to the losest free neighor: F m (h)=4 All noes of (h,f) re ssigne. The following tle ompres the performne of the lgorithms for this exmple: Algorithm Cost NN_eme 39 PMAP 34 Optiml Rnom Rnom 13% 26% Rnom Rnom 12% Rnom Rnom 11% - 32 Ring Mesh(8x4) 29% - 32 Mesh(8x4) Ring 28% - 32 Mesh(8x4) Mesh(8x4) 39% - 32 Mesh(8x4) Hyperue 10% - 32 Hyperue Mesh(8x4) 21% - 10 Ring Mesh(5x2) 32% 42% 10 Ring Binry Tree 10% 20% 10 Mesh(5x2) Ring 14% 24% 10 Mesh(5x2) Mesh(5x2) 31% 42% 10 Binry Tree Ring 20% 30% 10 Binry Tree Mesh(5x2) 21% 33% 7. Relte Work Tle 3: Performne results There re not mny systems whih tkle with the prolem of tsk llotion on speifi trget rhitetures, thus solving the physil mpping prolem. PYRROS, evelope y Yng n Gersoulis, uses the heuristi of Bokhri whih is se on simultion nneling. In OREGAMI [6] tsk llotion is performe in three steps: ontrtion of the tsk grph to smller grph, ssignment of the ontrte lusters of tsks to proessors n finlly routing of messges through the interonnetion network to minimize ontention. In OREGAMI, there exist nne lgorithms for typil
8 interonnetion ptterns onerning the trget prllel rhitetures, whih hve een evelope priori. If the interonnetion pttern is not in the ove lirry, the NN- Eme greey heuristi is use. PARALLAX [5], is nother sheuling tool whih ontins tsk llotion heuristi ssuming speifi interonnetion topology for the trget rhiteture. 8. Conlusion In this pper new pproh ws presente for the physil mpping of tsk grphs into prllel rhitetures hving ritrry interonnetion topologies. It is ovious the generl prolem is intrtle thus llowing only for effiient heuristis. The propose lgorithm hs low omplexity n gives very goo results for grphs with equilirte ommunition los etween jent tsks. This new lgorithm ws implemente n teste, n the outperforming results were reporte. Future work inlues the introution of itionl riteri whih woul inrese the heuristi s performne s fr s nonounterlne grphs re onerne. 9. Aknowlegements Journl of Prllel Progrmming, vol. 20, no. 3, 1991, pp [7] V. Lo. Heuristi Algorithms for Tsk Assignment in Distriute Systems. IEEE Trns. Comput., vol. C- 37, no. 11, pp , Nov [8] B. Monien An H. Suorough. Emeing one Interonnetion Network in Another. Computtionl Grph Theory, Springer-Verlg, Computing Supplement 7, pp , [9] C. H. Ppimitriou n M. Ynnkkis. Towr n Arhiteture-Inepenent Anlysis of Prllel Algorithms. SIAM J. Comput., vol. 19, pp , [10] V. Srkr. Prtitioning n Sheuling Prllel Progrms for Exeution on Multiproessors. Cmrige, MA: MIT Press, [11] H. Stone. Multiproessor Sheuling with the Ai of Network Flow Algorithms. IEEE Trns. Soft. Engin., vol. SE-3, no. 1, pp , Jul [12] T. Yng n A. Gersoulis. PYRROS: Stti Tsk Sheuling n Coe Genertion for Messge Pssing Multiproessors. Pro 6 th Int l Conf. Superomputing (ICS92), ACM Press, New York, N. Y., 1992, pp This reserh ws supporte in prt y the Greek Seretrit of Reserh n Tehnology (GSRT) uner PENED 99/308 Projet. Referenes [1] H. Ali et H. El-Rewini. Tsk Allotion in Distriute Systems: A Split Grph Moel. Journl of Comintoril Mthemtis n Comintoril Computing, vol. 14, pp , Otoer [2] H. El-Rewini, T. G. Lewis n H. Ali. Tsk Sheuling in Prllel n Distriute Systems. Prentie Hll, [3] A. Gersoulis n T. Yng. On the Grnulrity n Clustering of Direte Ayli Tsk Grphs. IEEE Trns. Prllel Distri. Syst., vol. 4, no. 6, pp , Jn [4] N. Koziris, G. Ppkonstntinou n P. Tsnks. Optiml Time n Effiient Spe Free Sheuling for Neste Loops. The Computer Journl, vol. 39, no 5, pp , [5] T. Lewis n Heshm El-Rewini. Prllx: A Tool for Prllel Progrm Sheuling. IEEE Prllel & Distriute Tehnology, vol. 1, no. 2, My 1993, pp [6] V. Lo, S. Rjophye, S. Gupt, D. Kelsen, M. Mohme, B. Nitzerg, J. Telle n X. Zhong. OREGAMI: Tools for Mpping Prllel Computtions to Prllel Arhitetures. Int l
V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V)
Definitions G = (V, E) V = set of verties (vertex / noe) E = set of eges (v, w) (v, w in V) (v, w) orere => irete grph (igrph) (v, w) non-orere => unirete grph igrph: w is jent to v if there is n ege from
More informationGreedy Algorithm. Algorithm Fall Semester
Greey Algorithm Algorithm 0 Fll Semester Optimiztion prolems An optimiztion prolem is one in whih you wnt to fin, not just solution, ut the est solution A greey lgorithm sometimes works well for optimiztion
More informationChapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.
Chpter 9 Greey Tehnique Copyright 2007 Person Aison-Wesley. All rights reserve. Greey Tehnique Construts solution to n optimiztion prolem piee y piee through sequene of hoies tht re: fesile lolly optiml
More informationDistance vector protocol
istne vetor protool Irene Finohi finohi@i.unirom.it Routing Routing protool Gol: etermine goo pth (sequene of routers) thru network from soure to Grph strtion for routing lgorithms: grph noes re routers
More information10.2 Graph Terminology and Special Types of Graphs
10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the
More informationMITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam
Cmrige, Msshusetts Introution to Mtrois n Applitions Srikumr Rmlingm MERL mm//yy Liner Alger (,0,0) (0,,0) Liner inepenene in vetors: v, v2,..., For ll non-trivil we hve s v s v n s, s2,..., s n 2v2...
More informationInternet Routing. Reminder: Routing. CPSC Network Programming
PS 360 - Network Progrmming Internet Routing Mihele Weigle eprtment of omputer Siene lemson University mweigle@s.lemson.eu pril, 00 http://www.s.lemson.eu/~mweigle/ourses/ps360 Reminer: Routing Internet
More informationGraph theory Route problems
Bhelors thesis Grph theory Route prolems Author: Aolphe Nikwigize Dte: 986 - -5 Sujet: Mthemtis Level: First level (Bhelor) Course oe: MAE Astrt In this thesis we will review some route prolems whih re
More informationDuality in linear interval equations
Aville online t http://ijim.sriu..ir Int. J. Industril Mthemtis Vol. 1, No. 1 (2009) 41-45 Dulity in liner intervl equtions M. Movhedin, S. Slhshour, S. Hji Ghsemi, S. Khezerloo, M. Khezerloo, S. M. Khorsny
More informationContainers: Queue and List
Continers: Queue n List Queue A ontiner in whih insertion is one t one en (the til) n eletion is one t the other en (the he). Also lle FIFO (First-In, First-Out) Jori Cortell n Jori Petit Deprtment of
More informationTable-driven look-ahead lexical analysis
Tle-riven look-he lexil nlysis WUU YANG Computer n Informtion Siene Deprtment Ntionl Chio-Tung University, HsinChu, Tiwn, R.O.C. Astrt. Moern progrmming lnguges use regulr expressions to efine vli tokens.
More informationA decision support system prototype for fuzzy multiple objective optimization
EUSFLAT - LFA A eision support system prototype for fuzzy multiple ojetive optimiztion Fengjie Wu Jie Lu n Gungqun Zhng Fulty of Informtion Tehnology University of Tehnology Syney Austrli E-mil: {fengjiewjieluzhngg}@it.uts.eu.u
More informationOutline. CS38 Introduction to Algorithms. Graphs. Graphs. Graphs. Graph traversals
Outline CS38 Introution to Algorithms Leture 2 April 3, 2014 grph trversls (BFS, DFS) onnetivity topologil sort strongly onnete omponents heps n hepsort greey lgorithms April 3, 2014 CS38 Leture 2 2 Grphs
More informationPartitioning for Parallelization Using Graph Parsing
Prtitioning for Prlleliztion Using Grph Prsing C. L. MCrery Deprtment of Computer Siene n Engineering Auurn University, Al 36849 e-mil: mrery@eng.uurn.eu (205) 844-6307 List of Figures Figure 3.1 Figure
More informationParallelization Optimization of System-Level Specification
Prlleliztion Optimiztion of System-Level Speifition Luki i niel. Gjski enter for Emedded omputer Systems University of liforni Irvine, 92697, US {li, gjski} @es.ui.edu strt This pper introdues the prlleliztion
More informationCOSC 6374 Parallel Computation. Dense Matrix Operations
COSC 6374 Prllel Computtion Dense Mtrix Opertions Edgr Griel Fll Edgr Griel Prllel Computtion Edgr Griel erminology Dense Mtrix: ll elements of the mtrix ontin relevnt vlues ypilly stored s 2-D rry, (e.g.
More informationUTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS
UTMC APPLICATION NOTE UT1553B BCRT TO 80186 INTERFACE INTRODUCTION The UTMC UT1553B BCRT is monolithi CMOS integrte iruit tht provies omprehensive Bus Controller n Remote Terminl funtions for MIL-STD-
More informationLecture 8: Graph-theoretic problems (again)
COMP36111: Advned Algorithms I Leture 8: Grph-theoreti prolems (gin) In Prtt-Hrtmnn Room KB2.38: emil: iprtt@s.mn..uk 2017 18 Reding for this leture: Sipser: Chpter 7. A grph is pir G = (V, E), where V
More informationGraph Contraction and Connectivity
Chpter 14 Grph Contrtion n Connetivity So fr we hve mostly overe tehniques for solving problems on grphs tht were evelope in the ontext of sequentil lgorithms. Some of them re esy to prllelize while others
More information[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
[Prksh* et l 58: ugust 6] ISSN: 77-9655 I Vlue: Impt Ftor: 6 IJESRT INTERNTIONL JOURNL OF ENGINEERING SIENES & RESERH TEHNOLOGY SOME PROPERTIES ND THEOREM ON FUZZY SU-TRIDENT DISTNE Prveen Prksh* M Geeth
More informationWORKSHOP 9 HEX MESH USING SWEEP VECTOR
WORKSHOP 9 HEX MESH USING SWEEP VECTOR WS9-1 WS9-2 Prolem Desription This exerise involves importing urve geometry from n IGES file. The urves re use to rete other urves. From the urves trimme surfes re
More informationMinimal Memory Abstractions
Miniml Memory Astrtions (As implemented for BioWre Corp ) Nthn Sturtevnt University of Alert GAMES Group Ferury, 7 Tlk Overview Prt I: Building Astrtions Minimizing memory requirements Performnes mesures
More informationCS553 Lecture Introduction to Data-flow Analysis 1
! Ide Introdution to Dt-flow nlysis!lst Time! Implementing Mrk nd Sweep GC!Tody! Control flow grphs! Liveness nlysis! Register llotion CS553 Leture Introdution to Dt-flow Anlysis 1 Dt-flow Anlysis! Dt-flow
More informationInternet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014.
omputer Networks 9/29/2014 IP Pket Formt Internet Routing Ki Shen IP protool version numer heder length (words) for qulity of servie mx numer remining hops (deremented t eh router) upper lyer protool to
More informationCooperative Routing in Multi-Source Multi-Destination Multi-hop Wireless Networks
oopertive Routing in Multi-Soure Multi-estintion Multi-hop Wireless Networks Jin Zhng Qin Zhng eprtment of omputer Siene n ngineering Hong Kong University of Siene n Tehnology, HongKong {zjzj, qinzh}@se.ust.hk
More informationLesson 4.4. Euler Circuits and Paths. Explore This
Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different
More informationCOSC 6374 Parallel Computation. Non-blocking Collective Operations. Edgar Gabriel Fall Overview
COSC 6374 Prllel Computtion Non-loking Colletive Opertions Edgr Griel Fll 2014 Overview Impt of olletive ommunition opertions Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition
More informationCS453 INTRODUCTION TO DATAFLOW ANALYSIS
CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 Leture Register llotion using liveness nlysis 1 Introdution to Dt-flow nlysis Lst Time Register llotion for expression trees nd lol nd prm vrs Tody Register
More informationCS 241 Week 4 Tutorial Solutions
CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it
More informationOutline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP
ARCH This work ws supported y: The Europen Reserh Counil, The Isreli Centers of Reserh Exellene, The Neptune Consortium, nd Ntionl Siene Foundtion wrd CNS-119748 Outline Motivtion Bkground Regulr Expression
More informationCICS Application Design
CICS Applition Design In orer to lern whih questions hve een nswere orretly: 1. Print these pges. 2. Answer the questions. 3. Sen this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the
More informationCOSC 6374 Parallel Computation. Communication Performance Modeling (II) Edgar Gabriel Fall Overview. Impact of communication costs on Speedup
COSC 6374 Prllel Computtion Communition Performne Modeling (II) Edgr Griel Fll 2015 Overview Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition Impt of olletive ommunition
More information[SYLWAN., 158(6)]. ISI
The proposl of Improved Inext Isomorphi Grph Algorithm to Detet Design Ptterns Afnn Slem B-Brhem, M. Rizwn Jmeel Qureshi Fulty of Computing nd Informtion Tehnology, King Adulziz University, Jeddh, SAUDI
More informationFASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE 1 M.JothiLkshmi, M.S., M.Phil. 2 C.Theeendr, M.S., M.Phil. 3 M.K.Pvithr,
More informationA matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications $
Informtion Systems 29 (2004) 23 46 A mthing lgorithm for mesuring the struturl similrity etween n XML oument n DTD n its pplitions $ Elis Bertino, Giovnn Guerrini, Mro Mesiti, * Diprtimento i Informti
More informationIntroduction. Example
OMS0 Introution isjoint sets n minimum spnning trees In this leture we will strt by isussing t struture use for mintining isjoint subsets of some bigger set. This hs number of pplitions, inluing to mintining
More informationLoop Shifting and Compaction for the High-Level Synthesis of Designs with Complex Control Flow
Shifting n Comption for the High-Level Synthesis of Designs with Complex Control low Sumit Gupt Nikil Dutt Rjesh Gupt Alexnru Niolu Center for Emee Computer Systems Shool of Informtion n Computer Siene
More informationPattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions
Pttern Mthing Pttern Mthing Some of these leture slides hve een dpted from: lgorithms in C, Roert Sedgewik. Gol. Generlize string serhing to inompletely speified ptterns. pplitions. Test if string or its
More informationCOMPUTER EDUCATION TECHNIQUES, INC. (WEBLOGIC_SVR_ADM ) SA:
In orer to lern whih questions hve een nswere orretly: 1. Print these pges. 2. Answer the questions. 3. Sen this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following
More informationLecture 13: Graphs I: Breadth First Search
Leture 13 Grphs I: BFS 6.006 Fll 2011 Leture 13: Grphs I: Bredth First Serh Leture Overview Applitions of Grph Serh Grph Representtions Bredth-First Serh Rell: Grph G = (V, E) V = set of verties (ritrry
More informationError Numbers of the Standard Function Block
A.2.2 Numers of the Stndrd Funtion Blok evlution The result of the logi opertion RLO is set if n error ours while the stndrd funtion lok is eing proessed. This llows you to rnh to your own error evlution
More informationCOMMON FRACTIONS. or a / b = a b. , a is called the numerator, and b is called the denominator.
COMMON FRACTIONS BASIC DEFINITIONS * A frtion is n inite ivision. or / * In the frtion is lle the numertor n is lle the enomintor. * The whole is seprte into "" equl prts n we re onsiering "" of those
More informationCOMP108 Algorithmic Foundations
Grph Theory Prudene Wong http://www.s.liv..uk/~pwong/tehing/omp108/201617 How to Mesure 4L? 3L 5L 3L ontiner & 5L ontiner (without mrk) infinite supply of wter You n pour wter from one ontiner to nother
More informationWidth and Bounding Box of Imprecise Points
Width nd Bounding Box of Impreise Points Vhideh Keikh Mrten Löffler Ali Mohdes Zhed Rhmti Astrt In this pper we study the following prolem: we re given set L = {l 1,..., l n } of prllel line segments,
More informationWhat are suffix trees?
Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl
More informationCMPUT101 Introduction to Computing - Summer 2002
CMPUT Introdution to Computing - Summer 22 %XLOGLQJ&RPSXWHU&LUFXLWV Chpter 4.4 3XUSRVH We hve looked t so fr how to uild logi gtes from trnsistors. Next we will look t how to uild iruits from logi gtes,
More informationLecture 12 : Topological Spaces
Leture 12 : Topologil Spes 1 Topologil Spes Topology generlizes notion of distne nd loseness et. Definition 1.1. A topology on set X is olletion T of susets of X hving the following properties. 1. nd X
More informationThe Network Layer: Routing in the Internet. The Network Layer: Routing & Addressing Outline
CPSC 852 Internetworking The Network Lyer: Routing in the Internet Mihele Weigle Deprtment of Computer Siene Clemson University mweigle@s.lemson.edu http://www.s.lemson.edu/~mweigle/ourses/ps852 1 The
More informationCellular-based Population to Enhance Genetic Algorithm for Assignment Problems
Amerin Journl of Intelligent Systems. 0; (): -5 DOI: 0. 593/j.jis.000.0 Cellulr-se Popultion to Enhne Geneti Algorithm for Assignment Prolems Hossein Rjlipour Cheshmehgz *, Hiollh Hron, Mohmm Rez Myoi
More informationStructure in solution spaces: Three lessons from Jean-Claude
Struture in solution spes: Three lessons from Jen-Clue Dvi Eppstein Computer Siene Deprtment, Univ. of Cliforni, Irvine Conferene on Meningfulness n Lerning Spes: A Triute to the Work of Jen-Clue Flmgne
More informationPremaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018
Premster Course Algorithms Chpter 6: Shortest Pths Christin Scheieler SS 8 Bsic Grph Algorithms Overview: Shortest pths in DAGs Dijkstr s lgorithm Bellmn-For lgorithm Johnson s metho SS 8 Chpter 6 Shortest
More informationCOMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE
24 th Interntionl Conferene on Eletriity Distriution Glsgow, 12-15 June 2017 Pper 0615 COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE Mihel SANKUR Dniel ARNOLD Lun SCHECTOR
More informationDistributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems
Distriuted Systems Priniples nd Prdigms Mrten vn Steen VU Amsterdm, Dept. Computer Siene steen@s.vu.nl Chpter 11: Distriuted File Systems Version: Deemer 10, 2012 2 / 14 Distriuted File Systems Distriuted
More informationIf you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.
Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online
More informationAsurveyofpractical algorithms for suffix tree construction in external memory
Asurveyofprtil lgorithms for suffix tree onstrution in externl memory M. Brsky,, U. Stege n A. Thomo University of Vitori, PO Box, STN CSC Vitori, BC, VW P, Cn SUMMAY The onstrution of suffix trees in
More informationGENG2140 Modelling and Computer Analysis for Engineers
GENG4 Moelling n Computer Anlysis or Engineers Letures 9 & : Gussin qurture Crete y Grn Romn Joles, PhD Shool o Mehnil Engineering, UWA GENG4 Content Deinition o Gussin qurture Computtion o weights n points
More informationRobust internal multiple prediction algorithm Zhiming James Wu, Sonika, Bill Dragoset*, WesternGeco
Roust internl multiple preition lgorithm Zhiming Jmes Wu, Sonik, Bill Drgoset*, WesternGeo Summry Multiple ttenution is n importnt t proessing step for oth mrine n ln t. Tehniques for surfe- rpily in the
More informationUsing SIMD Registers and Instructions to Enable Instruction-Level Parallelism in Sorting Algorithms
Using SIMD Registers n Instrutions to Enle Instrution-Level Prllelism in Sorting Algorithms Timothy Furtk furtk@s.ulert. José Nelson Amrl mrl@s.ulert. Roert Niewiomski niewio@s.ulert. Deprtment of Computing
More informationHash-based Subgraph Query Processing Method for Graph-structured XML Documents
Hsh-bse Subgrph Query Proessing Metho for Grph-struture XML Douments Hongzhi Wng Hrbin Institute of Teh. wngzh@hit.eu.n Jinzhong Li Hrbin Institute of Teh. lijzh@hit.eu.n Jizhou Luo Hrbin Institute of
More informationDistributed Systems Principles and Paradigms
Distriuted Systems Priniples nd Prdigms Christoph Dorn Distriuted Systems Group, Vienn University of Tehnology.dorn@infosys.tuwien..t http://www.infosys.tuwien..t/stff/dorn Slides dpted from Mrten vn Steen,
More informationCS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal
CS 55 Computer Grphis Hidden Surfe Removl Hidden Surfe Elimintion Ojet preision lgorithms: determine whih ojets re in front of others Uses the Pinter s lgorithm drw visile surfes from k (frthest) to front
More informationParadigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms
Prdigm. Dt Struture Known exmples: link tble, hep, Our leture: suffix tree Will involve mortize method tht will be stressed shortly in this ourse Suffix trees Wht is suffix tree? Simple pplitions History
More informationA Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards
A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin
More informationDistance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions
Distne Computtion etween Non-onvex Polyhedr t Short Rnge Bsed on Disrete Voronoi Regions Ktsuki Kwhi nd Hiroms Suzuki Deprtment of Preision Mhinery Engineering, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,
More informationShared Memory Architectures. Programming and Synchronization. Today s Outline. Page 1. Message passing review Cosmic Cube discussion
Tody s Outline Arhitetures Progrmming nd Synhroniztion Disuss pper on Cosmi Cube (messge pssing) Messge pssing review Cosmi Cube disussion > Messge pssing mhine Shred memory model > Communition > Synhroniztion
More informationWORKSHOP 8A TENSION COUPON
WORKSHOP 8A TENSION COUPON WS8A-2 Workshop Ojetives Buil the tension oupon geometry Control the mesh y using tehniques isusse in lss Compre FEA stress results to theoretil results From Stress Conentrtion
More informationWORKSHOP 8B TENSION COUPON
WORKSHOP 8B TENSION COUPON WS8B-2 Workshop Ojetives Prtie reting n eiting geometry Prtie mesh seeing n iso meshing tehniques. WS8B-3 Suggeste Exerise Steps 1. Crete new tse. 2. Crete geometry moel of the
More informationCS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string.
CS 340, Fll 2016 Sep 29th Exm 1 Nme: Note: in ll questions, the speil symol ɛ (epsilon) is used to indite the empty string. Question 1. [10 points] Speify regulr expression tht genertes the lnguge over
More informationSingle-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing
SASIMI 2010 Proeedings (R3-8) Single-Lyer Trunk Routing Using 45-Degree Lines within Critil Ares for PCB Routing Kyosuke SHINODA Yukihide KOHIRA Atsushi TAKAHASHI Tokyo Institute of Tehnology Dept. of
More informationTriple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding
Triple/Qudruple Ptterning Lyout Deomposition vi Novel Liner Progrmming nd Itertive Rounding Yio Lin, Xioqing Xu, Bei Yu, Ross Bldik nd Dvid Z. Pn ECE Dept., University of Texs t Austin, Austin, TX USA
More informationPrefetching in an Intelligent Memory Architecture Using a Helper Thread
Prefething in n Intelligent Memory Arhiteture Using Helper Thre Yn Solihin, Jejin Lee, n Josep Torrells University of Illinois t Urn-Chmpign Mihign Stte University solihin,torrells @s.uiu.eu jlee@se.msu.eu
More informationFault tree conversion to binary decision diagrams
Loughorough University Institutionl Repository Fult tree onversion to inry deision digrms This item ws sumitted to Loughorough University's Institutionl Repository y the/n uthor. Cittion: ANDREWS, J.D.
More informationComparing Hierarchical Data in External Memory
Compring Hierrhil Dt in Externl Memory Surshn S. Chwthe Deprtment of Computer Siene University of Mryln College Prk, MD 090 hw@s.um.eu Astrt We present n externl-memory lgorithm for omputing minimum-ost
More informationTEMPLATE FOR ENTRY in Encyclopedia of Database Systems: GRID FILE. Yannis Manolopoulos
TEMPLATE FOR ENTRY in Enylopedi of Dtse Systems: GRID FILE Apostolos N. Ppdopoulos Ynnis Mnolopoulos Ynnis Theodoridis Vssilis Tsotrs Deprtment of Informtis Aristotle University of Thessloniki Thessloniki,
More informationThe Droplet Virtual Brush for Chinese Calligraphic Character Modeling
The Droplet Virtul Brush for Chinese Clligrphi Chrter Moeling Xiofeng Mi Jie Xu Min Tng Jinxing Dong CAD & CG Stte Key L of Chin, Zhejing University, Hngzhou, Chin Artifiil Intelligene Institute, Zhejing
More informationBayesian Networks: Directed Markov Properties (Cont d) and Markov Equivalent DAGs
Byesin Networks: Direte Mrkov Properties (Cont ) n Mrkov Equivlent DAGs Huizhen Yu jney.yu@s.helsinki.fi Dept. Computer Siene, Univ. of Helsinki Proilisti Moels, Spring, 2010 Huizhen Yu (U.H.) Byesin Networks:
More informationComparison-based Choices
Comprison-se Choies John Ugner Mngement Siene & Engineering Stnfor University Joint work with: Jon Kleinerg (Cornell) Senhil Mullinthn (Hrvr) EC 17 Boston June 28, 2017 Preiting isrete hoies Clssi prolem:
More informationPROBLEM OF APOLLONIUS
PROBLEM OF APOLLONIUS In the Jnury 010 issue of Amerin Sientist D. Mkenzie isusses the Apollonin Gsket whih involves fining the rius of the lrgest irle whih just fits into the spe etween three tngent irles
More informationWORKSHOP 19 GLOBAL/LOCAL MODELING USING FEM FIELDS
WORKSHOP 19 GLOBAL/LOCAL MODELING USING FEM FIELDS WS19-1 WS19-2 Prolem Desription This exerise is use to emonstrte how to mp isplement results from the nlysis of glol(overll) moel onto the perimeter of
More informationMidterm Exam CSC October 2001
Midterm Exm CSC 173 23 Otoer 2001 Diretions This exm hs 8 questions, severl of whih hve suprts. Eh question indites its point vlue. The totl is 100 points. Questions 5() nd 6() re optionl; they re not
More informationMa/CS 6b Class 1: Graph Recap
M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/
More informationCOMP 423 lecture 11 Jan. 28, 2008
COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl
More informationProblem Final Exam Set 2 Solutions
CSE 5 5 Algoritms nd nd Progrms Prolem Finl Exm Set Solutions Jontn Turner Exm - //05 0/8/0. (5 points) Suppose you re implementing grp lgoritm tt uses ep s one of its primry dt strutures. Te lgoritm does
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More information3D Physical Design: Challenges and Solutions
3D Phsil Design: Chllenges n Solutions Roert Fishh, Jens Lienig, Tilo Meister Dresen Universit of Tehnolog Institute of Eletromehnil n Eletroni Design, Dresen, Germn www.ifte.e Emil: {fishh, lienig, meister}@ifte.e
More informationSOFTWARE-BUG LOCALIZATION WITH GRAPH MINING
Chpter 17 SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Frnk Eihinger Institute for Progrm Strutures nd Dt Orgniztion (IPD) Universit-t Krlsruhe (TH), Germny eihinger@ipd.uk.de Klemens B-ohm Institute for
More informationScalable Spatio-temporal Continuous Query Processing for Location-aware Services
Slle Sptio-temporl Continuous uery Proessing for Lotion-wre Servies iopeng iong Mohme F. Mokel Wli G. Aref Susnne E. Hmrush Sunil Prhkr Deprtment of Computer Sienes, Purue University, West Lfyette, IN
More informationType Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables
Type Cheking Rodmp (Where re we?) Lst leture Contet-sensitie nlysis Motition Attriute grmmrs Ad ho Synt-direted trnsltion This leture Type heking Type systems Using synt direted trnsltion Symol tles Leil
More informationAdvanced Programming Handout 5. Enter Okasaki. Persistent vs. Ephemeral. Functional Queues. Simple Example. Persistent vs.
Avne Progrmming Hnout 5 Purel Funtionl Dt Strutures: A Cse Stu in Funtionl Progrmming Persistent vs. Ephemerl An ephemerl t struture is one for whih onl one version is ville t time: fter n upte opertion,
More informationUsing Red-Eye to improve face detection in low quality video images
Using Re-Eye to improve fe etetion in low qulity vieo imges Rihr Youmrn Shool of Informtion Tehnology University of Ottw, Cn youmrn@site.uottw. Any Aler Shool of Informtion Tehnology University of Ottw,
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationEvaluating Regular Expression Matching Engines on Network and General Purpose Processors
Evluting Regulr Expression Mthing Engines on Network n Generl Purpose Proessors Mihel Behi Wshington University Computer Siene n Engineering St. Louis, MO 63130-4899 mehi@se.wustl.eu Chrlie Wisemn Wshington
More informationMcAfee Web Gateway
Relese Notes Revision C MAfee We Gtewy 7.6.2.11 Contents Aout this relese Enhnement Resolved issues Instlltion instrutions Known issues Additionl informtion Find produt doumenttion Aout this relese This
More informationDeclarative Routing: Extensible Routing with Declarative Queries
elrtive Routing: Extensile Routing with elrtive Queries Boon Thu Loo 1 Joseph M. Hellerstein 1,2, Ion toi 1, Rghu Rmkrishnn3, 1 University of Cliforni t Berkeley, 2 Intel Reserh Berkeley, 3 University
More informationUsing a User-Level Memory Thread for Correlation Prefetching
Using User-Level Memory Thre for Correltion Prefething Yn Solihin Jejin Lee Josep Torrells University of Illinois t Urn-Chmpign Mihign Stte University http://iom.s.uiu.eu http://www.se.msu.eu/ jlee Astrt
More informationEfficient Subscription Management in Content-based Networks
Effiient Susription Mngement in Content-sed Networks Rphël Chnd, Psl A. Feler Institut EURECOM 06904 Sophi Antipolis, Frne {hnd feler}@eureom.fr Astrt Content-sed pulish/susrie systems offer onvenient
More informationLINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION
Overview LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION 4.4.1.0 Due to the omplex nture of this updte, plese fmilirize yourself with these instrutions nd then ontt RGB Spetrum Tehnil
More informationP(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have
Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using
More informationMa/CS 6b Class 1: Graph Recap
M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph
More information