An Efficient Algorithm for the Physical Mapping of Clustered Task Graphs onto Multiprocessor Architectures

Size: px
Start display at page:

Download "An Efficient Algorithm for the Physical Mapping of Clustered Task Graphs onto Multiprocessor Architectures"

Transcription

1 An Effiient Algorithm for the Physil Mpping of Clustere Tsk Grphs onto Multiproessor Arhitetures Netrios Koziris Pnyiotis Tsnks Mihel Romesis George Ppkonstntinou Ntionl Tehnil University of Athens Dept. of Eletril n Computer Engineering Computer Siene Division Computing Systems Lortory Zogrfou Cmpus, Zogrfou 15773, Greee e-mil: {nkoziris, mromes}@sl.ee.ntu.gr Astrt The most importnt issue in sequentil progrm prllelistion is the effiient ssignment of omputtions into ifferent proessing elements. In the pst, too mny pprohes were evote in effiient progrm prlleliztion onsiering vrious moels for the prllel progrms n the trget rhitetures. The most wiely use prllelism esription moel is the tsk grph moel with preeene onstrints. Nevertheless, s fr s physil mpping of tsks onto prllel rhitetures is onerne, little reserh hs given prtil results. It is well known tht the physil mpping prolem is NP-hr in the strong sense, thus llowing only for heuristi pprohes. Most reserhers or tool progrmmers use exhustive lgorithms, or the lssil metho of simulte nneling. This pper presents n lterntive pproh onto the mpping prolem. Given the grph of lustere tsks, n the grph of the trget istriute rhiteture, our heuristi fins mpping y first pling the highly ommunitive tsks on jent noes of the proessor network. One these «kone» tsks re mppe, there is no ktrking, thus hieving low omplexity. Therefore, the remining tsks re ple eginning from those lose to the «kone» tsks. The pper onlues with performne n omprison results whih revel the metho s effiieny. 1. Introution In the lst yers the evolution in the fiels of VLSI tehnology n omputer networking hs given rise to the utiliztion of istriute omputing systems. Distriute omputers re ttrtive to mny emning pplitions sine they provie the user with moulrity, slility n low ost eentrlize proessing power. Nevertheless istriute omputing hs soun rwk whih isourges pplition evelopers to use it. The existene of mny prllel proessors is not fully exploite euse of the interproessor ommunition overhe. The egrtion of optiml speeup when the numer of proessors inreses is use y the exessive sometimes mount of messges etween non-neighoring ells. Reserhers hve lrey fouse on suh lowperformne prolems n propose vrious methoologies to the optiml prlleliztion of the given progrms. Experiene hs shown tht n effetive solution to the generl tsk grph sheuling prolem onto given rhiteture is multistep pproh whih inlues the tsk grph esription of the prolem, effiient sheuling of the tsks onto virtul fully onnete prllel mhine, merging tsks into lrger lusters n finlly ssigning lusters into the physil proessor topology. As fr s the tsk grph sheuling with preeene onstrints is onerne, the most wiely use moel is the irete yli grph with eges n noes hving vrious weights. Noe weights represent omputtion time for the orresponing tsks, while ege weights re ommunition requirements etween tsks. Eh ege iretion gives set of preeene onstrints whih shoul e preserve. The generl tsk grph sheuling prolem with ommunition elys is NP-COMPLETE s presente in [9]. Srkr [10], Gersoulis n Yng [3] presente goo heuristis for solving the tsk grph sheuling prolem with ritrry ommunition osts. All previous reserhers were supposing unoune or oune numer of proessors with CLIQUE topology.

2 This hypothetil topology is fr wy from the relisti se. Moern istriute memory prllel systems re orgnize in ifferent topologies, inluing hyperue, mesh or ring rhitetures. There is strong nee for effiient plement of lustere tsks into the rel proessor network. The mpping of virtul into rel topologies is lle the physil mpping prolem or the tsk llotion prolem. The tsk llotion prolem n e optimlly solve in speil ses suh s two-proessor istriute systems, or liner rry of ny numer of proessors. If the trget rhiteture ontins two proessors, then the tsk llotion prolem is stte s mximum flow minimum ut prolem [11] whih n e polynomilly solve using, for exmple, the For-Fulkerson lgorithm. There lso exists heuristi presente [7], whih resses the generl m-proessor prolem using the 2-wy min ut lgorithm m times. Most of the theoretil work on mppings onsiers struture grphs like gris, hyperues, trees, et [8]. An inresing numer of pplitions emn methos eling with irregulr grphs. The generl mpping prolem is unfortuntely NP-omplete, thus llowing only for effiient heuristis. Our pper els with the intrtle prolem of luster llotion onto prllel rhitetures, y proposing n lterntive pproh to the ove mentione methoologies. We moel ny trget prllel rhiteture y non-irete grph with unitry ege weights only. This representtion retins the meningful only etils of the trget. Next, the grph of tsks is epite s nonirete grph with vrious ege osts n noe weights resulting from lustering heuristis s the one propose y Gersoulis in [3]. The tsk ssignment proeure strts y tring the lusters whih re most likely to e ple in neighoring ples, where the mximum numer of links is ville. This step ens y pling these kone lusters into these ples. For eh of the kone lusters, the lgorithm retes sets of neighoring lusters whih re nite for plement into the jent ells of every pressigne kone luster. The lgorithm ens when ll lusters re ssigne. In the reminer of this pper the following re presente n further elorte: Setion II reviews the multistep pproh of tsk grph sheuling with preeene onstrints using speifi topology istriute rhiteture. Setion III presents the propose grph moel for the prllel rhiteture n the utilize ost funtion for evluting ifferent physil mppings. In setion IV we outline the steps of the propose lgorithm. Finlly setion V the propose lgorithm is ompre to other pprohes in terms of effiieny n the outperforming results re shown. 2. The Multistep Approh The generl sheuling prolem of n ritrry tsk grph with ommunition elys onto fixe size n onnetion pttern istriute rhiteture is NP- COMPLETE. El-Rewini et H. Ali in [1], [2] prove this NP ompleteness y representing the prolem of tsk llotion onto istriute system with split grph. The tsk llotion is therefore equivlent to weighte lique grph prtitioning whih is NP-COMPLETE, thus proving inherent intrtility. In orer to fin effiient methos, reserhers hve followe multistep pproh, where eh step resses limite instne of the generl prolem. The suessive steps re outline s follows: tsk lustering, luster merging n physil mpping Tsk Clustering - Sheuling tsk grph with ommunition elys onto oune/unoune CLIQUE of proessors. First the tsk grph with omputtion/ommunition osts n preeene onstrints is sheule onto fully onnete network of proessors. The lssil CLIQUE rhiteture is therefore use s trget hving limite or unlimite numer of proessors [4]. Reserhers, in this first step, propose lgorithms whih minimize the mximum mkespn, isregring the tul proessor s topology. Even when the mkespn metri is to e minimize, the sheuling prolem remins NP- COMPLETE in the mjority of generl ses. Ppimitriou et Ynnkkis in [9] hve prove tht the lssil sheuling prolem of tsk grph with ritrry ommunition n omputtion times is NP- COMPLETE. They propose 2-optiml pproximtion lgorithm. In ition to this, Srkr in [10], Gersoulis in [3] propose fster heuristis with eptle performne. All these lgorithms perform the sme initil step: Cluster the tsks into lrge noes, so tht the grin of the prllelism is inrese n the use of istriute proessors is minimizing the tsk grph mkespn. The resulting topology, y pplying this initil step is grph of lusters. Insie every luster there exist severl tsks whih re time sheule in the sme proessor n hve zero intrommunition overhe. As fr s lusters interommunition is onerne, this is the summtion over ll tsks interommunition overhe for ll lusters. This orgnises the set of tsks into lusters with the following property: Eh luster ontins ll tsks whih re to e exeute on the sme proessor. This step is lle tsk lustering.

3 2.2. Cluster Merging into p physil lusters In this step, the set of lustere tsks is mppe onto lique of oune numer of proessors. Sine the set of lustere tsks is lrger thn the numer of ville proessors, this step ssigns two or more lusters to the sme proessor. Srkr in [10] hs propose sheuling heuristi with O( V ( V + E )) omplexity, where V stns for the numer of noes n E for the numer of eges. A lower omplexity heuristi whih is use in PYRROS [12] is the work profiling metho. It merges lusters whih hve pproximtely the sme rithmeti lo Physil Mpping of p physil lusters onto p network onnete proessors. While so muh effort hs een one onerning the first steps, the finl step of luster llotion onto the physil proessor topology hs not given onsierle ttention. Few reserhers suh s Bokhri hve presente some heuristis. Mny sheuling tools whih suh s OREGAMI or PYRROS or PARALLAX use heuristis or pproximtion lgorithms whih re sometimes effiient. For exmple Gersoulis et Yng in Pyrros [12] use Bokhri s heuristi whih is se onto simulte nneling. This lgorithm strts from n initil ssignment, then performs series of pirwise interhnges y reuing the ost funtion n stops fter O(p 3 ) steps. In Oregmi s [6] MAPPER, tool for tsk llotion onto istriute rhitetures, greey heuristi is use, lle the NN-Eme. It urrently supports only mesh n hyperue proessor networks thus limiting its potentil use. Even in the se of those two rhitetures, it uses rther simple metho, y listing ll eges in sening orer of their weights n ssigning them to the proessor s network eges The NN-Eme Algorithm Given tsk grph, it first onstruts list of ll the eges in the grph, sorte y weight. The heuristi then trverses this list in liner time n for eh ege, ssign enpoints s follows: If oth noes hve lrey een ssigne, o nothing If only one noe hs een ssigne, then ssign the other noe to the losest free proessor If neither noe hs een ssigne, rnomly hoose free proessor n ssign one noe to it n the other to its losest free neighor. The sorting step nees O( E log E ) time, n the rest is O( E ). It is fst heuristi, ut it is limite to hyperue n mesh topologies. Oviously, it hs poor performne in mny ses euse it is se on single-ege jeny, n it oes not tke into ount ny set of jent noes. In Exmple 5, we pply oth our metho n the NN-Eme, n the outperforming results of the propose heuristi re shown. In PARALLAX [5], ll tsk llotion heuristis ssume fully onnete networks of proessors. Only the mpping heuristi onsiers ritrry proessor interonnetion topology. It uses moifie list sheuling tehnique with priorities, y tking into ount the ommunition elys. The noe s priority in the list is its level. In [8], Monien n Suorough reviewe results on mpping speifi tsk grphs into the most populr prllel rhitetures. 3. Grph Moels Our prolem onsiers two grphs: The grph of virtul proessors, or equivlently the grph of lustere tsks, efine s G (V, E ) n the grph of physil proessors, efine s G p (V p, E p ). Definition 3.1: Consier two grphs n G w (V w, E w ) where V is the set of noes n E is the set of eges with V w = V p, we efine the following funtion F m :V w V p s the physil mpping funtion : v w,v w V w with (v w,v w ) E w, (F m (v w ),F m (v w )) E p Let us efine some topologil prmeters for the proessor grph/network: Hop is the unit istne etween ny two iretly onnete proessors in the network Distne etween two proessor noes u n v is lle the numer of hops in the shortest pth onneting u n v. Distne is represente y ist(u,v). The following formul efines the ost funtion use to evlute the ifferent mppings: Cost Funtion for mpping F m : CF(F m ) = ist(f m (v w ), F m (u w ) )xomm(v w, u w ) Y X ( Z Z Z where: ist( F m (v w ), F m (u w ) ) is the shortest pth in the proessor grph etween the 2 proessors-noes where the tsks v w n u w re mppe. omm(v w, u w ) is the totl ommunition ost etween the tsks v w,u w The following properties hrterize the effiieny of mpping from G w to G p : Ege-iltion is the mximum istne in G p n ege of G w hs to e route. Formlly:

4 Ege-ongestion is the mximum numer of eges from G w route vi n ritrry ege (or noe) of G p In most theoretil works eling with the physil mpping prolem, minimizing ege iltion n ege ongestion re the primry gols. Our ojetive is therefore to fin the mpping F m whih minimizes CF m, or formlly: opt Definition 3.2: A mpping F m with respet to Cost Funtion CF() is lle optiml if: CF(F opt m ) = min { CF(F m ) F m MAP}, where MAP is the set of ll possile mppings 3.1. Exmple Consier the G (V,E ) with ij osts shown in figure 1, n the proessor grph G p (V p,e p ): Figure 4: Mpping F M1 CF M1 = 2 + 4X = Figure 5: Mpping F M2 G C Figure 1. The Cluster Grph 1 2 CF M2 = 4 + 2X X2 = 21 Oviously, F m1 is etter thn F m2 in terms of totl ompletion time, sine it imposes less ommunition overhe thn F m2. The lest ommunition is hieve y mpping F m3 shown elow: G P 3 4 Figure 2 : The trget rhiteture 1 2 Figure 6: Optiml Mpping F M3 CF m3 = x3 = Figure 3: CLIQUE rhiteture Oviously there exist 4! lterntive mppings whih n e foun y exhustive serh. For exmple, onsier the following lterntive mppings n evlute the orresponing ost funtion CF m (): 4. The Physil Mpping Algorithm (PMAP) This heuristi tries to fin the most ommunition intensive tsk-noes n mp them n their neighors into neighoring proessing noes on the proessor grph. At the eginning, the proessor grph is nlyze n, for eh noe, the numer of jent noes is lulte. Susequently, the noes of the tsk grph re sorte y sening orer of their totl ommunition weight n numer of neighors. The heuristi then ples the most emning tsk-noes in terms of totl ommunition links n ost to the respetive noes of the proessor grph. One these ore tsk noes re ple, there is no ktrking. Next, the heuristi ples the jent of the

5 ore noes to jent ells of the proessor grph, y mking lolly est-fit omprisons. The lgorithm performs the following steps: 4.1. First Phse: 1 st step: Ajust the mximum numer of neighors in the tsk-grph to the mximum numer in the proessor grph, y removing the less ommunition ost eges for eh tsk-noe. 2 n step: Sort the noes of the proessor grph y sening orer of their neighoring links n the noes in the luster grph G y the numer of ommunition links they nee. 3 r step: Assign the most emning tsk-noe to the est suitle noe of the proessor grph n his neighoring noes to the est suitle neighoring noes of the proessor grph Seon Phse: 4 th step: Ple k the eges remove t the first step. 5 th step: From the proessors not llote yet fin the one who neighors with the most proessors lrey ssigne. 6 th step: Fin tsk tht is istne y t most i (t the eginning i=1) from ll the tsks tht re mppe to the neighoring proessors of the proessor foun on the previous step. If foun ssign this tsk to the proessor of the 5 th step. 7 th step: Repet steps 5-6 until no more ssignments n e me. If there re more proessors to e llote, inrese i y one n go k to the 5 th step Detils of the lgorithm 1 st Phse: Ajust_neighors(G ); Aj(v) = {u: (u,v) E } /* Plement of the most ommunition ostful noe */ fin v G : rnk(v ) = mx rnk(v) fin v p G p : rnk(v p) = mx rnk(v) F m(v ) = v p; /* Plement of neigors to neigoring ells */ while Aj(v p) egin fin v : rnk(v ) = mx rnk (v ) Aj(v ) = Aj(v )-{v } fin v p : rnk(v p) = mx rnk (v p) F m(v ) = v p PROCS_ALLOC = PROCS_ALLOC {v p} PROCS_LEFT = PROCS_LEFT-{v p} TASKS_LEFT = TASKS_LEFT-{v } en 2 n phse: /* Plement of ll other noes */ Ple_k_eges; i=1 while PROCS_LEFT egin ssigning=flse for ll u PROCS_LEFT egin fin u Aj(u) PROCS_ALLOC = mx NEIGH = { v i: F m (v i) (Aj(u) PROCS_ALLOC)} /*set of tsks whih hve lrey een ssigne to neighoring pros*/ Aj(1,v i)=aj(v i) Aj(i,v i)=aj(i-1, v i) {u:(u,w) E C,w Aj(i-1,v i)} let CAND= Aj(i,v i) TASKS_LEFT if CAND egin fin v n : rnk(v n) = mx rnk (v), v CAND F m(u)=v n PROCS_LEFT=PROCS_LEFT-{u}; PROCS_ALLOC = PROCS_ALLOC {u}; TASKS_LEFT = TASK_LEFT-{v n} ssigning=true en en /* of for*/ if ssigning=flse then i=i+1 /* i inreses when uring the previous yle there hs een no ssignment */ en Ajust_neighors routine: neigh_r=mx Aj(v), v G p For eh v G : Aj(v) > neigh_r repet fin u Aj(v): omm(v, u) = min omm(v, w) w Aj(v) Aj(v)=Aj(v)-u until Aj(v) = neigh_r en of for; 5. Exmple Consier the G (V, E ) with ij osts shown in figure 7, n the proessor grph G p (V p,e p ) in figure 8: g Figure 7: The Cluster Grph for Exmple e 4 h 5 2 f

6 Figure 8: The trget rhiteture for Exmple 5.1.First Phse Sine # of Neighors of > mx Neigh we just the tsk grph y eleting eges : (,h) = 1, (, e) = 2. Tsk # of Neighors Totl rnking omm e f g h Tle 1: Sttsistis for the tsk grph V p =1,V =f F m (f)=1 Aj(f)={, e, h } F m ()=2 F m (e)=3 F m (h)=5 TASKS_LEFT={,,,g} 1f e h Figure 9: Assignments fter the 1 st phse 5.2 Seon Phse: insert k eges : (,h)=1,(,e)=2 1 st yle i=1 u 1 =4, Aj(4) PROCS_ALLOC = 2 u 2 =6, Aj(6) PROCS_ALLOC = 2 u 3 =7, Aj(7) PROCS_ALLOC = 2 u 4 =8, Aj(8) PROCS_ALLOC = 0 Let u = 4: NEIGH = {,e} CAND=Aj() Aj(e) TASKS_LEFT= Let u = 6: NEIGH={,h} CAND=Aj() Aj(h) TASKS_LEFT={g} F m (g)=6 2 n yle i=1 u 1 =4, Aj(4) PROCS_ALLOC =2 u 2 =7, Aj(7) PROCS_ALLOC =2 u 3 =8, Aj(8) PROCS_ALLOC =1 Let u = 4: NEIGH = {,e} CAND =Aj() Aj(e) TASKS_LEFT= Let u = 7: NEIGH = {h,e} CAND=Aj(h) Aj(e) TASKS_LEFT= Let u = 8: NEIGH={g} CAND=Aj(g) TASKS_LEFT= No ssignment uring this yle: i inreses y one 3 r yle i=2 u 1 =4, Aj(4) PROCS_ALLOC =2 u 2 =7, Aj(7) PROCS_ALLOC =2 u 3 =8, Aj(8) PROCS_ALLOC =1 Let u = 4: NEIGH = {,e} CAND = Aj(2,) Aj(2,e) TASKS_LEFT = {,} F m ()=4 4 th yle i=2 u 1 =7, Aj(7) PROCS_ALLOC =2 u 2 =8, Aj(8) PROCS_ALLOC =2 Let u = 7: NEIGH = {h,e} CAND=Aj(2,h) Aj(2,e) TASKS_LEFT = Let u = 8: NEIGH= {,g} CAND=Aj(2,) Aj(2,g) TASKS_LEFT = No ssignment uring this yle: i inreses y one 5 th yle i=3 u 1 =7, Aj(7) PROCS_ALLOC =2 u 2 =8, Aj(8) PROCS_ALLOC =2

7 Let u = 7: NEIGH={h, e} CAND=Aj(3,h) Aj(3,e) TASKS_LEFT={,} F m ()=7 F m ()=8 5h 6g 1f 3e Figure 10: Assignments fter the 2 n phse PMAP result 5.3. NN-Eme lgorithm 8 6. Performne Results We report our experiments on the PMAP lgorithm. For the ske of omprisons we hve rete progrm whih, given the tsk n the proessor grphs, genertes ll possile mppings n lultes the totl ommunition time se on the metri of setion III. We hve lso rete rnom tsk grph genertor with vrious ommunition-ege weights n numer of tsksnoes n grph genertor se on fixe topologies. We hve lso pplie the PMAP heuristi n the NN_Eme heuristi on the sme grph pirs. The results otine re shown in the tle elow. We n see tht the PMAP lgorithm gives etter results thn the NN_Eme lgorithm, espeilly when the tsk n proessor grphs hve fixe topologies. But even when the grphs hve een rnomly rete PMAP outperforms NN-Eme y more thn 10%. Sorting of Eges in esening orer of their weight: Noes Tsk topology Proessor topology PMAP vs. NN_Eme optiml vs. NN_Eme (e,f) 5 (,) 2 (,) 4 (,e) 2 (,f) 4 (g,h) 2 (,) 3 (h,f) 2 (g,) 3 Tle 2: Weight of eges Assign (e,f) ege to n ritrry ege, e.g: F m (e)=1, F m (f)=5 Assign (,) ege to n ritrry ege, e.g: F m ()=2, F m ()=6 Assign (,f) ege: Sine f is lrey ssigne, ssign to the losest free neighor: F m ()=7 All noes of (,) re ssigne. Assign (g,) ege: Sine is lrey ssigne, ssign g to the losest free neighor: F m (g)=3 Assign (,) ege: Sine is lrey ssigne, ssign to the losest free neighor: F m ()=8 All noes of (e,) re ssigne. Assign (g,h) ege: Sine g is lrey ssigne, ssign h to the losest free neighor: F m (h)=4 All noes of (h,f) re ssigne. The following tle ompres the performne of the lgorithms for this exmple: Algorithm Cost NN_eme 39 PMAP 34 Optiml Rnom Rnom 13% 26% Rnom Rnom 12% Rnom Rnom 11% - 32 Ring Mesh(8x4) 29% - 32 Mesh(8x4) Ring 28% - 32 Mesh(8x4) Mesh(8x4) 39% - 32 Mesh(8x4) Hyperue 10% - 32 Hyperue Mesh(8x4) 21% - 10 Ring Mesh(5x2) 32% 42% 10 Ring Binry Tree 10% 20% 10 Mesh(5x2) Ring 14% 24% 10 Mesh(5x2) Mesh(5x2) 31% 42% 10 Binry Tree Ring 20% 30% 10 Binry Tree Mesh(5x2) 21% 33% 7. Relte Work Tle 3: Performne results There re not mny systems whih tkle with the prolem of tsk llotion on speifi trget rhitetures, thus solving the physil mpping prolem. PYRROS, evelope y Yng n Gersoulis, uses the heuristi of Bokhri whih is se on simultion nneling. In OREGAMI [6] tsk llotion is performe in three steps: ontrtion of the tsk grph to smller grph, ssignment of the ontrte lusters of tsks to proessors n finlly routing of messges through the interonnetion network to minimize ontention. In OREGAMI, there exist nne lgorithms for typil

8 interonnetion ptterns onerning the trget prllel rhitetures, whih hve een evelope priori. If the interonnetion pttern is not in the ove lirry, the NN- Eme greey heuristi is use. PARALLAX [5], is nother sheuling tool whih ontins tsk llotion heuristi ssuming speifi interonnetion topology for the trget rhiteture. 8. Conlusion In this pper new pproh ws presente for the physil mpping of tsk grphs into prllel rhitetures hving ritrry interonnetion topologies. It is ovious the generl prolem is intrtle thus llowing only for effiient heuristis. The propose lgorithm hs low omplexity n gives very goo results for grphs with equilirte ommunition los etween jent tsks. This new lgorithm ws implemente n teste, n the outperforming results were reporte. Future work inlues the introution of itionl riteri whih woul inrese the heuristi s performne s fr s nonounterlne grphs re onerne. 9. Aknowlegements Journl of Prllel Progrmming, vol. 20, no. 3, 1991, pp [7] V. Lo. Heuristi Algorithms for Tsk Assignment in Distriute Systems. IEEE Trns. Comput., vol. C- 37, no. 11, pp , Nov [8] B. Monien An H. Suorough. Emeing one Interonnetion Network in Another. Computtionl Grph Theory, Springer-Verlg, Computing Supplement 7, pp , [9] C. H. Ppimitriou n M. Ynnkkis. Towr n Arhiteture-Inepenent Anlysis of Prllel Algorithms. SIAM J. Comput., vol. 19, pp , [10] V. Srkr. Prtitioning n Sheuling Prllel Progrms for Exeution on Multiproessors. Cmrige, MA: MIT Press, [11] H. Stone. Multiproessor Sheuling with the Ai of Network Flow Algorithms. IEEE Trns. Soft. Engin., vol. SE-3, no. 1, pp , Jul [12] T. Yng n A. Gersoulis. PYRROS: Stti Tsk Sheuling n Coe Genertion for Messge Pssing Multiproessors. Pro 6 th Int l Conf. Superomputing (ICS92), ACM Press, New York, N. Y., 1992, pp This reserh ws supporte in prt y the Greek Seretrit of Reserh n Tehnology (GSRT) uner PENED 99/308 Projet. Referenes [1] H. Ali et H. El-Rewini. Tsk Allotion in Distriute Systems: A Split Grph Moel. Journl of Comintoril Mthemtis n Comintoril Computing, vol. 14, pp , Otoer [2] H. El-Rewini, T. G. Lewis n H. Ali. Tsk Sheuling in Prllel n Distriute Systems. Prentie Hll, [3] A. Gersoulis n T. Yng. On the Grnulrity n Clustering of Direte Ayli Tsk Grphs. IEEE Trns. Prllel Distri. Syst., vol. 4, no. 6, pp , Jn [4] N. Koziris, G. Ppkonstntinou n P. Tsnks. Optiml Time n Effiient Spe Free Sheuling for Neste Loops. The Computer Journl, vol. 39, no 5, pp , [5] T. Lewis n Heshm El-Rewini. Prllx: A Tool for Prllel Progrm Sheuling. IEEE Prllel & Distriute Tehnology, vol. 1, no. 2, My 1993, pp [6] V. Lo, S. Rjophye, S. Gupt, D. Kelsen, M. Mohme, B. Nitzerg, J. Telle n X. Zhong. OREGAMI: Tools for Mpping Prllel Computtions to Prllel Arhitetures. Int l

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V)

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V) Definitions G = (V, E) V = set of verties (vertex / noe) E = set of eges (v, w) (v, w in V) (v, w) orere => irete grph (igrph) (v, w) non-orere => unirete grph igrph: w is jent to v if there is n ege from

More information

Greedy Algorithm. Algorithm Fall Semester

Greedy Algorithm. Algorithm Fall Semester Greey Algorithm Algorithm 0 Fll Semester Optimiztion prolems An optimiztion prolem is one in whih you wnt to fin, not just solution, ut the est solution A greey lgorithm sometimes works well for optimiztion

More information

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved. Chpter 9 Greey Tehnique Copyright 2007 Person Aison-Wesley. All rights reserve. Greey Tehnique Construts solution to n optimiztion prolem piee y piee through sequene of hoies tht re: fesile lolly optiml

More information

Distance vector protocol

Distance vector protocol istne vetor protool Irene Finohi finohi@i.unirom.it Routing Routing protool Gol: etermine goo pth (sequene of routers) thru network from soure to Grph strtion for routing lgorithms: grph noes re routers

More information

10.2 Graph Terminology and Special Types of Graphs

10.2 Graph Terminology and Special Types of Graphs 10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the

More information

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam Cmrige, Msshusetts Introution to Mtrois n Applitions Srikumr Rmlingm MERL mm//yy Liner Alger (,0,0) (0,,0) Liner inepenene in vetors: v, v2,..., For ll non-trivil we hve s v s v n s, s2,..., s n 2v2...

More information

Internet Routing. Reminder: Routing. CPSC Network Programming

Internet Routing. Reminder: Routing. CPSC Network Programming PS 360 - Network Progrmming Internet Routing Mihele Weigle eprtment of omputer Siene lemson University mweigle@s.lemson.eu pril, 00 http://www.s.lemson.eu/~mweigle/ourses/ps360 Reminer: Routing Internet

More information

Graph theory Route problems

Graph theory Route problems Bhelors thesis Grph theory Route prolems Author: Aolphe Nikwigize Dte: 986 - -5 Sujet: Mthemtis Level: First level (Bhelor) Course oe: MAE Astrt In this thesis we will review some route prolems whih re

More information

Duality in linear interval equations

Duality in linear interval equations Aville online t http://ijim.sriu..ir Int. J. Industril Mthemtis Vol. 1, No. 1 (2009) 41-45 Dulity in liner intervl equtions M. Movhedin, S. Slhshour, S. Hji Ghsemi, S. Khezerloo, M. Khezerloo, S. M. Khorsny

More information

Containers: Queue and List

Containers: Queue and List Continers: Queue n List Queue A ontiner in whih insertion is one t one en (the til) n eletion is one t the other en (the he). Also lle FIFO (First-In, First-Out) Jori Cortell n Jori Petit Deprtment of

More information

Table-driven look-ahead lexical analysis

Table-driven look-ahead lexical analysis Tle-riven look-he lexil nlysis WUU YANG Computer n Informtion Siene Deprtment Ntionl Chio-Tung University, HsinChu, Tiwn, R.O.C. Astrt. Moern progrmming lnguges use regulr expressions to efine vli tokens.

More information

A decision support system prototype for fuzzy multiple objective optimization

A decision support system prototype for fuzzy multiple objective optimization EUSFLAT - LFA A eision support system prototype for fuzzy multiple ojetive optimiztion Fengjie Wu Jie Lu n Gungqun Zhng Fulty of Informtion Tehnology University of Tehnology Syney Austrli E-mil: {fengjiewjieluzhngg}@it.uts.eu.u

More information

Outline. CS38 Introduction to Algorithms. Graphs. Graphs. Graphs. Graph traversals

Outline. CS38 Introduction to Algorithms. Graphs. Graphs. Graphs. Graph traversals Outline CS38 Introution to Algorithms Leture 2 April 3, 2014 grph trversls (BFS, DFS) onnetivity topologil sort strongly onnete omponents heps n hepsort greey lgorithms April 3, 2014 CS38 Leture 2 2 Grphs

More information

Partitioning for Parallelization Using Graph Parsing

Partitioning for Parallelization Using Graph Parsing Prtitioning for Prlleliztion Using Grph Prsing C. L. MCrery Deprtment of Computer Siene n Engineering Auurn University, Al 36849 e-mil: mrery@eng.uurn.eu (205) 844-6307 List of Figures Figure 3.1 Figure

More information

Parallelization Optimization of System-Level Specification

Parallelization Optimization of System-Level Specification Prlleliztion Optimiztion of System-Level Speifition Luki i niel. Gjski enter for Emedded omputer Systems University of liforni Irvine, 92697, US {li, gjski} @es.ui.edu strt This pper introdues the prlleliztion

More information

COSC 6374 Parallel Computation. Dense Matrix Operations

COSC 6374 Parallel Computation. Dense Matrix Operations COSC 6374 Prllel Computtion Dense Mtrix Opertions Edgr Griel Fll Edgr Griel Prllel Computtion Edgr Griel erminology Dense Mtrix: ll elements of the mtrix ontin relevnt vlues ypilly stored s 2-D rry, (e.g.

More information

UTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS

UTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS UTMC APPLICATION NOTE UT1553B BCRT TO 80186 INTERFACE INTRODUCTION The UTMC UT1553B BCRT is monolithi CMOS integrte iruit tht provies omprehensive Bus Controller n Remote Terminl funtions for MIL-STD-

More information

Lecture 8: Graph-theoretic problems (again)

Lecture 8: Graph-theoretic problems (again) COMP36111: Advned Algorithms I Leture 8: Grph-theoreti prolems (gin) In Prtt-Hrtmnn Room KB2.38: emil: iprtt@s.mn..uk 2017 18 Reding for this leture: Sipser: Chpter 7. A grph is pir G = (V, E), where V

More information

Graph Contraction and Connectivity

Graph Contraction and Connectivity Chpter 14 Grph Contrtion n Connetivity So fr we hve mostly overe tehniques for solving problems on grphs tht were evelope in the ontext of sequentil lgorithms. Some of them re esy to prllelize while others

More information

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 [Prksh* et l 58: ugust 6] ISSN: 77-9655 I Vlue: Impt Ftor: 6 IJESRT INTERNTIONL JOURNL OF ENGINEERING SIENES & RESERH TEHNOLOGY SOME PROPERTIES ND THEOREM ON FUZZY SU-TRIDENT DISTNE Prveen Prksh* M Geeth

More information

WORKSHOP 9 HEX MESH USING SWEEP VECTOR

WORKSHOP 9 HEX MESH USING SWEEP VECTOR WORKSHOP 9 HEX MESH USING SWEEP VECTOR WS9-1 WS9-2 Prolem Desription This exerise involves importing urve geometry from n IGES file. The urves re use to rete other urves. From the urves trimme surfes re

More information

Minimal Memory Abstractions

Minimal Memory Abstractions Miniml Memory Astrtions (As implemented for BioWre Corp ) Nthn Sturtevnt University of Alert GAMES Group Ferury, 7 Tlk Overview Prt I: Building Astrtions Minimizing memory requirements Performnes mesures

More information

CS553 Lecture Introduction to Data-flow Analysis 1

CS553 Lecture Introduction to Data-flow Analysis 1 ! Ide Introdution to Dt-flow nlysis!lst Time! Implementing Mrk nd Sweep GC!Tody! Control flow grphs! Liveness nlysis! Register llotion CS553 Leture Introdution to Dt-flow Anlysis 1 Dt-flow Anlysis! Dt-flow

More information

Internet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014.

Internet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014. omputer Networks 9/29/2014 IP Pket Formt Internet Routing Ki Shen IP protool version numer heder length (words) for qulity of servie mx numer remining hops (deremented t eh router) upper lyer protool to

More information

Cooperative Routing in Multi-Source Multi-Destination Multi-hop Wireless Networks

Cooperative Routing in Multi-Source Multi-Destination Multi-hop Wireless Networks oopertive Routing in Multi-Soure Multi-estintion Multi-hop Wireless Networks Jin Zhng Qin Zhng eprtment of omputer Siene n ngineering Hong Kong University of Siene n Tehnology, HongKong {zjzj, qinzh}@se.ust.hk

More information

Lesson 4.4. Euler Circuits and Paths. Explore This

Lesson 4.4. Euler Circuits and Paths. Explore This Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different

More information

COSC 6374 Parallel Computation. Non-blocking Collective Operations. Edgar Gabriel Fall Overview

COSC 6374 Parallel Computation. Non-blocking Collective Operations. Edgar Gabriel Fall Overview COSC 6374 Prllel Computtion Non-loking Colletive Opertions Edgr Griel Fll 2014 Overview Impt of olletive ommunition opertions Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition

More information

CS453 INTRODUCTION TO DATAFLOW ANALYSIS

CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 Leture Register llotion using liveness nlysis 1 Introdution to Dt-flow nlysis Lst Time Register llotion for expression trees nd lol nd prm vrs Tody Register

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP ARCH This work ws supported y: The Europen Reserh Counil, The Isreli Centers of Reserh Exellene, The Neptune Consortium, nd Ntionl Siene Foundtion wrd CNS-119748 Outline Motivtion Bkground Regulr Expression

More information

CICS Application Design

CICS Application Design CICS Applition Design In orer to lern whih questions hve een nswere orretly: 1. Print these pges. 2. Answer the questions. 3. Sen this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the

More information

COSC 6374 Parallel Computation. Communication Performance Modeling (II) Edgar Gabriel Fall Overview. Impact of communication costs on Speedup

COSC 6374 Parallel Computation. Communication Performance Modeling (II) Edgar Gabriel Fall Overview. Impact of communication costs on Speedup COSC 6374 Prllel Computtion Communition Performne Modeling (II) Edgr Griel Fll 2015 Overview Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition Impt of olletive ommunition

More information

[SYLWAN., 158(6)]. ISI

[SYLWAN., 158(6)]. ISI The proposl of Improved Inext Isomorphi Grph Algorithm to Detet Design Ptterns Afnn Slem B-Brhem, M. Rizwn Jmeel Qureshi Fulty of Computing nd Informtion Tehnology, King Adulziz University, Jeddh, SAUDI

More information

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE 1 M.JothiLkshmi, M.S., M.Phil. 2 C.Theeendr, M.S., M.Phil. 3 M.K.Pvithr,

More information

A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications $

A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications $ Informtion Systems 29 (2004) 23 46 A mthing lgorithm for mesuring the struturl similrity etween n XML oument n DTD n its pplitions $ Elis Bertino, Giovnn Guerrini, Mro Mesiti, * Diprtimento i Informti

More information

Introduction. Example

Introduction. Example OMS0 Introution isjoint sets n minimum spnning trees In this leture we will strt by isussing t struture use for mintining isjoint subsets of some bigger set. This hs number of pplitions, inluing to mintining

More information

Loop Shifting and Compaction for the High-Level Synthesis of Designs with Complex Control Flow

Loop Shifting and Compaction for the High-Level Synthesis of Designs with Complex Control Flow Shifting n Comption for the High-Level Synthesis of Designs with Complex Control low Sumit Gupt Nikil Dutt Rjesh Gupt Alexnru Niolu Center for Emee Computer Systems Shool of Informtion n Computer Siene

More information

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions Pttern Mthing Pttern Mthing Some of these leture slides hve een dpted from: lgorithms in C, Roert Sedgewik. Gol. Generlize string serhing to inompletely speified ptterns. pplitions. Test if string or its

More information

COMPUTER EDUCATION TECHNIQUES, INC. (WEBLOGIC_SVR_ADM ) SA:

COMPUTER EDUCATION TECHNIQUES, INC. (WEBLOGIC_SVR_ADM ) SA: In orer to lern whih questions hve een nswere orretly: 1. Print these pges. 2. Answer the questions. 3. Sen this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following

More information

Lecture 13: Graphs I: Breadth First Search

Lecture 13: Graphs I: Breadth First Search Leture 13 Grphs I: BFS 6.006 Fll 2011 Leture 13: Grphs I: Bredth First Serh Leture Overview Applitions of Grph Serh Grph Representtions Bredth-First Serh Rell: Grph G = (V, E) V = set of verties (ritrry

More information

Error Numbers of the Standard Function Block

Error Numbers of the Standard Function Block A.2.2 Numers of the Stndrd Funtion Blok evlution The result of the logi opertion RLO is set if n error ours while the stndrd funtion lok is eing proessed. This llows you to rnh to your own error evlution

More information

COMMON FRACTIONS. or a / b = a b. , a is called the numerator, and b is called the denominator.

COMMON FRACTIONS. or a / b = a b. , a is called the numerator, and b is called the denominator. COMMON FRACTIONS BASIC DEFINITIONS * A frtion is n inite ivision. or / * In the frtion is lle the numertor n is lle the enomintor. * The whole is seprte into "" equl prts n we re onsiering "" of those

More information

COMP108 Algorithmic Foundations

COMP108 Algorithmic Foundations Grph Theory Prudene Wong http://www.s.liv..uk/~pwong/tehing/omp108/201617 How to Mesure 4L? 3L 5L 3L ontiner & 5L ontiner (without mrk) infinite supply of wter You n pour wter from one ontiner to nother

More information

Width and Bounding Box of Imprecise Points

Width and Bounding Box of Imprecise Points Width nd Bounding Box of Impreise Points Vhideh Keikh Mrten Löffler Ali Mohdes Zhed Rhmti Astrt In this pper we study the following prolem: we re given set L = {l 1,..., l n } of prllel line segments,

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

CMPUT101 Introduction to Computing - Summer 2002

CMPUT101 Introduction to Computing - Summer 2002 CMPUT Introdution to Computing - Summer 22 %XLOGLQJ&RPSXWHU&LUFXLWV Chpter 4.4 3XUSRVH We hve looked t so fr how to uild logi gtes from trnsistors. Next we will look t how to uild iruits from logi gtes,

More information

Lecture 12 : Topological Spaces

Lecture 12 : Topological Spaces Leture 12 : Topologil Spes 1 Topologil Spes Topology generlizes notion of distne nd loseness et. Definition 1.1. A topology on set X is olletion T of susets of X hving the following properties. 1. nd X

More information

The Network Layer: Routing in the Internet. The Network Layer: Routing & Addressing Outline

The Network Layer: Routing in the Internet. The Network Layer: Routing & Addressing Outline CPSC 852 Internetworking The Network Lyer: Routing in the Internet Mihele Weigle Deprtment of Computer Siene Clemson University mweigle@s.lemson.edu http://www.s.lemson.edu/~mweigle/ourses/ps852 1 The

More information

Cellular-based Population to Enhance Genetic Algorithm for Assignment Problems

Cellular-based Population to Enhance Genetic Algorithm for Assignment Problems Amerin Journl of Intelligent Systems. 0; (): -5 DOI: 0. 593/j.jis.000.0 Cellulr-se Popultion to Enhne Geneti Algorithm for Assignment Prolems Hossein Rjlipour Cheshmehgz *, Hiollh Hron, Mohmm Rez Myoi

More information

Structure in solution spaces: Three lessons from Jean-Claude

Structure in solution spaces: Three lessons from Jean-Claude Struture in solution spes: Three lessons from Jen-Clue Dvi Eppstein Computer Siene Deprtment, Univ. of Cliforni, Irvine Conferene on Meningfulness n Lerning Spes: A Triute to the Work of Jen-Clue Flmgne

More information

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018 Premster Course Algorithms Chpter 6: Shortest Pths Christin Scheieler SS 8 Bsic Grph Algorithms Overview: Shortest pths in DAGs Dijkstr s lgorithm Bellmn-For lgorithm Johnson s metho SS 8 Chpter 6 Shortest

More information

COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE

COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE 24 th Interntionl Conferene on Eletriity Distriution Glsgow, 12-15 June 2017 Pper 0615 COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE Mihel SANKUR Dniel ARNOLD Lun SCHECTOR

More information

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems Distriuted Systems Priniples nd Prdigms Mrten vn Steen VU Amsterdm, Dept. Computer Siene steen@s.vu.nl Chpter 11: Distriuted File Systems Version: Deemer 10, 2012 2 / 14 Distriuted File Systems Distriuted

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Asurveyofpractical algorithms for suffix tree construction in external memory

Asurveyofpractical algorithms for suffix tree construction in external memory Asurveyofprtil lgorithms for suffix tree onstrution in externl memory M. Brsky,, U. Stege n A. Thomo University of Vitori, PO Box, STN CSC Vitori, BC, VW P, Cn SUMMAY The onstrution of suffix trees in

More information

GENG2140 Modelling and Computer Analysis for Engineers

GENG2140 Modelling and Computer Analysis for Engineers GENG4 Moelling n Computer Anlysis or Engineers Letures 9 & : Gussin qurture Crete y Grn Romn Joles, PhD Shool o Mehnil Engineering, UWA GENG4 Content Deinition o Gussin qurture Computtion o weights n points

More information

Robust internal multiple prediction algorithm Zhiming James Wu, Sonika, Bill Dragoset*, WesternGeco

Robust internal multiple prediction algorithm Zhiming James Wu, Sonika, Bill Dragoset*, WesternGeco Roust internl multiple preition lgorithm Zhiming Jmes Wu, Sonik, Bill Drgoset*, WesternGeo Summry Multiple ttenution is n importnt t proessing step for oth mrine n ln t. Tehniques for surfe- rpily in the

More information

Using SIMD Registers and Instructions to Enable Instruction-Level Parallelism in Sorting Algorithms

Using SIMD Registers and Instructions to Enable Instruction-Level Parallelism in Sorting Algorithms Using SIMD Registers n Instrutions to Enle Instrution-Level Prllelism in Sorting Algorithms Timothy Furtk furtk@s.ulert. José Nelson Amrl mrl@s.ulert. Roert Niewiomski niewio@s.ulert. Deprtment of Computing

More information

Hash-based Subgraph Query Processing Method for Graph-structured XML Documents

Hash-based Subgraph Query Processing Method for Graph-structured XML Documents Hsh-bse Subgrph Query Proessing Metho for Grph-struture XML Douments Hongzhi Wng Hrbin Institute of Teh. wngzh@hit.eu.n Jinzhong Li Hrbin Institute of Teh. lijzh@hit.eu.n Jizhou Luo Hrbin Institute of

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Priniples nd Prdigms Christoph Dorn Distriuted Systems Group, Vienn University of Tehnology.dorn@infosys.tuwien..t http://www.infosys.tuwien..t/stff/dorn Slides dpted from Mrten vn Steen,

More information

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal CS 55 Computer Grphis Hidden Surfe Removl Hidden Surfe Elimintion Ojet preision lgorithms: determine whih ojets re in front of others Uses the Pinter s lgorithm drw visile surfes from k (frthest) to front

More information

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms Prdigm. Dt Struture Known exmples: link tble, hep, Our leture: suffix tree Will involve mortize method tht will be stressed shortly in this ourse Suffix trees Wht is suffix tree? Simple pplitions History

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions Distne Computtion etween Non-onvex Polyhedr t Short Rnge Bsed on Disrete Voronoi Regions Ktsuki Kwhi nd Hiroms Suzuki Deprtment of Preision Mhinery Engineering, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,

More information

Shared Memory Architectures. Programming and Synchronization. Today s Outline. Page 1. Message passing review Cosmic Cube discussion

Shared Memory Architectures. Programming and Synchronization. Today s Outline. Page 1. Message passing review Cosmic Cube discussion Tody s Outline Arhitetures Progrmming nd Synhroniztion Disuss pper on Cosmi Cube (messge pssing) Messge pssing review Cosmi Cube disussion > Messge pssing mhine Shred memory model > Communition > Synhroniztion

More information

WORKSHOP 8A TENSION COUPON

WORKSHOP 8A TENSION COUPON WORKSHOP 8A TENSION COUPON WS8A-2 Workshop Ojetives Buil the tension oupon geometry Control the mesh y using tehniques isusse in lss Compre FEA stress results to theoretil results From Stress Conentrtion

More information

WORKSHOP 8B TENSION COUPON

WORKSHOP 8B TENSION COUPON WORKSHOP 8B TENSION COUPON WS8B-2 Workshop Ojetives Prtie reting n eiting geometry Prtie mesh seeing n iso meshing tehniques. WS8B-3 Suggeste Exerise Steps 1. Crete new tse. 2. Crete geometry moel of the

More information

CS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string.

CS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string. CS 340, Fll 2016 Sep 29th Exm 1 Nme: Note: in ll questions, the speil symol ɛ (epsilon) is used to indite the empty string. Question 1. [10 points] Speify regulr expression tht genertes the lnguge over

More information

Single-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing

Single-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing SASIMI 2010 Proeedings (R3-8) Single-Lyer Trunk Routing Using 45-Degree Lines within Critil Ares for PCB Routing Kyosuke SHINODA Yukihide KOHIRA Atsushi TAKAHASHI Tokyo Institute of Tehnology Dept. of

More information

Triple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding

Triple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding Triple/Qudruple Ptterning Lyout Deomposition vi Novel Liner Progrmming nd Itertive Rounding Yio Lin, Xioqing Xu, Bei Yu, Ross Bldik nd Dvid Z. Pn ECE Dept., University of Texs t Austin, Austin, TX USA

More information

Prefetching in an Intelligent Memory Architecture Using a Helper Thread

Prefetching in an Intelligent Memory Architecture Using a Helper Thread Prefething in n Intelligent Memory Arhiteture Using Helper Thre Yn Solihin, Jejin Lee, n Josep Torrells University of Illinois t Urn-Chmpign Mihign Stte University solihin,torrells @s.uiu.eu jlee@se.msu.eu

More information

Fault tree conversion to binary decision diagrams

Fault tree conversion to binary decision diagrams Loughorough University Institutionl Repository Fult tree onversion to inry deision digrms This item ws sumitted to Loughorough University's Institutionl Repository y the/n uthor. Cittion: ANDREWS, J.D.

More information

Comparing Hierarchical Data in External Memory

Comparing Hierarchical Data in External Memory Compring Hierrhil Dt in Externl Memory Surshn S. Chwthe Deprtment of Computer Siene University of Mryln College Prk, MD 090 hw@s.um.eu Astrt We present n externl-memory lgorithm for omputing minimum-ost

More information

TEMPLATE FOR ENTRY in Encyclopedia of Database Systems: GRID FILE. Yannis Manolopoulos

TEMPLATE FOR ENTRY in Encyclopedia of Database Systems: GRID FILE. Yannis Manolopoulos TEMPLATE FOR ENTRY in Enylopedi of Dtse Systems: GRID FILE Apostolos N. Ppdopoulos Ynnis Mnolopoulos Ynnis Theodoridis Vssilis Tsotrs Deprtment of Informtis Aristotle University of Thessloniki Thessloniki,

More information

The Droplet Virtual Brush for Chinese Calligraphic Character Modeling

The Droplet Virtual Brush for Chinese Calligraphic Character Modeling The Droplet Virtul Brush for Chinese Clligrphi Chrter Moeling Xiofeng Mi Jie Xu Min Tng Jinxing Dong CAD & CG Stte Key L of Chin, Zhejing University, Hngzhou, Chin Artifiil Intelligene Institute, Zhejing

More information

Bayesian Networks: Directed Markov Properties (Cont d) and Markov Equivalent DAGs

Bayesian Networks: Directed Markov Properties (Cont d) and Markov Equivalent DAGs Byesin Networks: Direte Mrkov Properties (Cont ) n Mrkov Equivlent DAGs Huizhen Yu jney.yu@s.helsinki.fi Dept. Computer Siene, Univ. of Helsinki Proilisti Moels, Spring, 2010 Huizhen Yu (U.H.) Byesin Networks:

More information

Comparison-based Choices

Comparison-based Choices Comprison-se Choies John Ugner Mngement Siene & Engineering Stnfor University Joint work with: Jon Kleinerg (Cornell) Senhil Mullinthn (Hrvr) EC 17 Boston June 28, 2017 Preiting isrete hoies Clssi prolem:

More information

PROBLEM OF APOLLONIUS

PROBLEM OF APOLLONIUS PROBLEM OF APOLLONIUS In the Jnury 010 issue of Amerin Sientist D. Mkenzie isusses the Apollonin Gsket whih involves fining the rius of the lrgest irle whih just fits into the spe etween three tngent irles

More information

WORKSHOP 19 GLOBAL/LOCAL MODELING USING FEM FIELDS

WORKSHOP 19 GLOBAL/LOCAL MODELING USING FEM FIELDS WORKSHOP 19 GLOBAL/LOCAL MODELING USING FEM FIELDS WS19-1 WS19-2 Prolem Desription This exerise is use to emonstrte how to mp isplement results from the nlysis of glol(overll) moel onto the perimeter of

More information

Midterm Exam CSC October 2001

Midterm Exam CSC October 2001 Midterm Exm CSC 173 23 Otoer 2001 Diretions This exm hs 8 questions, severl of whih hve suprts. Eh question indites its point vlue. The totl is 100 points. Questions 5() nd 6() re optionl; they re not

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

Problem Final Exam Set 2 Solutions

Problem Final Exam Set 2 Solutions CSE 5 5 Algoritms nd nd Progrms Prolem Finl Exm Set Solutions Jontn Turner Exm - //05 0/8/0. (5 points) Suppose you re implementing grp lgoritm tt uses ep s one of its primry dt strutures. Te lgoritm does

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

3D Physical Design: Challenges and Solutions

3D Physical Design: Challenges and Solutions 3D Phsil Design: Chllenges n Solutions Roert Fishh, Jens Lienig, Tilo Meister Dresen Universit of Tehnolog Institute of Eletromehnil n Eletroni Design, Dresen, Germn www.ifte.e Emil: {fishh, lienig, meister}@ifte.e

More information

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Chpter 17 SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Frnk Eihinger Institute for Progrm Strutures nd Dt Orgniztion (IPD) Universit-t Krlsruhe (TH), Germny eihinger@ipd.uk.de Klemens B-ohm Institute for

More information

Scalable Spatio-temporal Continuous Query Processing for Location-aware Services

Scalable Spatio-temporal Continuous Query Processing for Location-aware Services Slle Sptio-temporl Continuous uery Proessing for Lotion-wre Servies iopeng iong Mohme F. Mokel Wli G. Aref Susnne E. Hmrush Sunil Prhkr Deprtment of Computer Sienes, Purue University, West Lfyette, IN

More information

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables Type Cheking Rodmp (Where re we?) Lst leture Contet-sensitie nlysis Motition Attriute grmmrs Ad ho Synt-direted trnsltion This leture Type heking Type systems Using synt direted trnsltion Symol tles Leil

More information

Advanced Programming Handout 5. Enter Okasaki. Persistent vs. Ephemeral. Functional Queues. Simple Example. Persistent vs.

Advanced Programming Handout 5. Enter Okasaki. Persistent vs. Ephemeral. Functional Queues. Simple Example. Persistent vs. Avne Progrmming Hnout 5 Purel Funtionl Dt Strutures: A Cse Stu in Funtionl Progrmming Persistent vs. Ephemerl An ephemerl t struture is one for whih onl one version is ville t time: fter n upte opertion,

More information

Using Red-Eye to improve face detection in low quality video images

Using Red-Eye to improve face detection in low quality video images Using Re-Eye to improve fe etetion in low qulity vieo imges Rihr Youmrn Shool of Informtion Tehnology University of Ottw, Cn youmrn@site.uottw. Any Aler Shool of Informtion Tehnology University of Ottw,

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Evaluating Regular Expression Matching Engines on Network and General Purpose Processors

Evaluating Regular Expression Matching Engines on Network and General Purpose Processors Evluting Regulr Expression Mthing Engines on Network n Generl Purpose Proessors Mihel Behi Wshington University Computer Siene n Engineering St. Louis, MO 63130-4899 mehi@se.wustl.eu Chrlie Wisemn Wshington

More information

McAfee Web Gateway

McAfee Web Gateway Relese Notes Revision C MAfee We Gtewy 7.6.2.11 Contents Aout this relese Enhnement Resolved issues Instlltion instrutions Known issues Additionl informtion Find produt doumenttion Aout this relese This

More information

Declarative Routing: Extensible Routing with Declarative Queries

Declarative Routing: Extensible Routing with Declarative Queries elrtive Routing: Extensile Routing with elrtive Queries Boon Thu Loo 1 Joseph M. Hellerstein 1,2, Ion toi 1, Rghu Rmkrishnn3, 1 University of Cliforni t Berkeley, 2 Intel Reserh Berkeley, 3 University

More information

Using a User-Level Memory Thread for Correlation Prefetching

Using a User-Level Memory Thread for Correlation Prefetching Using User-Level Memory Thre for Correltion Prefething Yn Solihin Jejin Lee Josep Torrells University of Illinois t Urn-Chmpign Mihign Stte University http://iom.s.uiu.eu http://www.se.msu.eu/ jlee Astrt

More information

Efficient Subscription Management in Content-based Networks

Efficient Subscription Management in Content-based Networks Effiient Susription Mngement in Content-sed Networks Rphël Chnd, Psl A. Feler Institut EURECOM 06904 Sophi Antipolis, Frne {hnd feler}@eureom.fr Astrt Content-sed pulish/susrie systems offer onvenient

More information

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION Overview LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION 4.4.1.0 Due to the omplex nture of this updte, plese fmilirize yourself with these instrutions nd then ontt RGB Spetrum Tehnil

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information