A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

Size: px
Start display at page:

Download "A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER"

Transcription

1 A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University of Madrid Dpto. de Ingeniería Electrónica, E.T.S.I. de Telecounicación, Ciudad Universitaria s/n, Madrid SPAIN Abstract: The RC4 strea cipher, widely used in telecounication systes, is analysed by a new cryptanalytic algorith, which exploits the cobinatorial nature of the RC4 to reduce the search space over the exhaustive search. This algorith finds the initial state of the RC4 using a sall segent of output strea by collecting the inforation available at given tie. To forulate our attack, we have proposed the tree representation of the RC4, which contains all possible inforation at given tie. Since all available inforation could not be practically exploited, we introduced an abstraction in for of the general conditions in order to consider the reasonable aount of inforation. The proposed algorith exaines the general conditions ordered in the tree structure using the hill-clibing search strategy. Each exaination produces new inforation. The solution is found when a sufficient aount of inforation is reached. Although the coplexity of this attack is significantly better than in the case of exhaustive search, it is still insufficient to enace the security of the RC4 cipher. Key-Words: telecounication systes, strea cipher, cryptanalysis, RC4, coplexity, hill-clibing Introduction The alleged RC4 strea cipher is one of a sall nuber of proposed algoriths based on the tableshuffling principle []. The RC4 initial table, derived for the secret key, varies slowly in tie steps by swapping two its entries, while the other entries in the table reain the sae. The output function deterines the position in the table whose value is used as an output sybol. A sequence of output sybols akes the strea, which is XORed with the plaintext to generate the final ciphertext. The RC4 algorith is widely used, aong others, in telecounication systes where high speed and low delay are required. The cryptanalysis of the RC4 strea cipher [2] has been ainly devoted to the statistical analysis of the RC4 output sequence [3], [4] or to the initialization weaknesses of this strea cipher [5]-[7]. It is still an open question if these results can be used in the RC4 practical cryptanalysis. The concrete cryptanalytic algoriths have been very rare in the literature up to now. The ost iportant algoriths for decipherent of RC4 are an algorith forulated by Knudsen et al. [8] and the other, very siilar one, by Mister and Tavares [9]. These algoriths find the correct initial table using a sall segent of output strea. Both of the track the steps of the RC4 algorith and according to the current content of the table, assign the values fro the set of allowed ones to unknown table entries. Since the output sequence depends on the initial table only, the knowledge of the initial table enables generating the output sequence without knowing the secret key. Although these attacks do not pose a practical threat to the security of the cipher, they could be used in copleting the internal state, given soe additional inforation [0]. Our cryptanalytic efforts regarding RC4 strea cipher were devoted to finding axiu inforation about the current state available at given tie and to forulate an algorith based on this inforation. To this end, we proposed the tree representation of the RC4, which contains the set of trees, each for one output sybol. In their nodes and branches, these trees encopass all possible inforation at given tie. However, since the trees are progressively large we could not exploit all available inforation in our attack. This proble is iinent for all other attacks, since there is no eritorious way for deterination if their actions and conclusions are based on the full set of inforation at given tie. In our algorith, we proposed an analytical abstraction, naed the general

2 conditions, of the tree inforation in order to consider a reasonable aount of inforation. Each general condition represents all conditions fro the sub-tree. For each general condition, the probability that it leads to the solution is found. To reduce the search space, we ordered the general conditions in a tree structure in respect to their probabilities. Further, we defined the cryptanalytic algorith that exaines the general conditions contained in the tree nodes using the hill-clibing search strategy. Each exaination gives new inforation, so that the aount of inforation increases in each step. After collecting sufficient inforation, soe entries, or the whole initial table are found. Although the results show that the search space in our algorith is significantly reduced over the exhaustive search, this still poses no threat in practical applications. The rest of this paper is organized as follows. In Section 2, we give a short description of RC4, and show how the tree-like inforation of the RC4 can be represented by the general conditions. Section 3 presents our search algorith for the initial table reconstruction. In Section 4 the coplexity of our algorith is estiated. We conclude in Section 5. 2 General Conditions The RC4 is a faily of algoriths paraeterized by a positive integer n (usually n = 8). As it is described in [], the internal state of RC4 at tie t consists of a perutation table S t of 2 n different n-bit values which varies slowly in tie steps by swapping two entries indexed by two n-bit pointers i t and j t. For the pointers i 0 and j 0 initialized to zero, the RC4 algorith can be described as: i t = t () j t = j t- + S t- ( t ) (2) S t ( t ) = S t- ( j t ), S t ( j t ) = S t- ( t ) (3) Z t = S t ( S t ( t ) + S t ( j t ) ) (4) Equation (4), which describes the generation of the output sybol Z t, can be written as: Z t = S t (L t ), L t = S t ( t ) + S t ( j t ) (5) The content of the S t table can be given by: S t (t) = S t- ( j t ) (6) St ( k), k jt St ( k t) = St () t, k = jt (7) Applying equations (6) and (7), it follows that equation (5) can be represented by the tree structure shown in Figure. The tree corresponds to the output sybol Z t and consists of the nodes distributed at t levels. Nodes at tree level i, 0 < i t refer to the set of all possible positions in the S t-i table where Z t could be found. The nodes are connected by the branches, which represent the conditions to pass fro one node to another. Each path in this tree represents an AND function of the conditions expressed by the branches on this path. At tie t, the RC4 can be represented by the set of t trees, each for one output sybol. These trees contain all possible inforation about the current state because they refer to all positions (and related conditions) in the S i tables, 0 i t, where the output sybols could be found. For larger t, the tree grows very fast, and the nuber of conditions becoes enorous. In striving to reduce the search space, we propose a ethod to replace the entire sets of particular conditions by the analytically forulated general conditions. Cobining equations (2)-(5), there follows: S t- (t) = j t - j t- (8) S t- (j t ) = L t - j t + j t- (9) On the basis of equations (8) and (9), it is possible to replace the whole sub-trees whose roots correspond to the expressions like S k- (k) and S k- (j k ) by ore general conditions. One general condition can be exained instead of all conditions fro the given sub-tree. For exaple, the subtree linked to the node Z t = S t- (j t ) (denoted by in Figure ) can be replaced by the general condition C (Table ) so that the condition on the path to this node L t = t is cobined with this equation and equations (8) and (9). In a siilar way, we can derive the other general conditions. Since the tree is partitioned into 2t+ parts, the general conditions at tie t, denoted as Ci, i =,,5, corresponding to the sub-trees indicated by nubers fro to 5, are given in Table. As can be seen, the conditions C3 and C4 encopass t- conditions each. Also, they do not exist at the initial tie. The expression pos(z t ) denotes the position of Z t in the initial table. All calculations are odulo 2 n. By introducing the general conditions, we neglect soe inforation, but significantly decrease the nuber of conditions that will be exained. The probabilities that general conditions lead to the solution are generally unequal and can be deterined by ultiplying the known probabilities of conditions on the path to the given node (Table 2). Since these probabilities depend on tie, the general conditions are not always, i.e. for each tie, ordered in the sae way in respect to their probability.

3 Figure. Tree representation of the RC4 algorith

4 Table. General conditions C: j t = t - Z t + j t- L t = t S t- (t) = t - Z t S t- (j t ) = Z t Level 0 A A 0 A 2 A 3 C2: j t = Z t + j t- L t = j t t S t- (t) = Z t S t- (j t ) = j t A A 2 A 3 A 4 A 5... C3 (p [2, t]): C4 (p [2, t]): Z t = j t-p+ - j t-p L t = j t-p+ t, t-, t-2,, t-p+, j t, j t-, j t-2,, j t-p+2 S t-p (t-p+) = Z t S t- (t) = j t -j t- S t- (j t ) = j t-p+ - j t +j t- Z t = L t-p+ - j t-p+ + j t-p L t = t-p+ j t, j t-, j t-2,, j t-p+2 S t-p+ (t-p+)= Z t S t- (t) = j t - j t- S t- (j t ) = t - p + - j t + j t- C5: L t t, t-, t-2,,, j t, j t-, j t-2,, j L t = pos(z t ) S t- (t) = j t - j t- S t- (j t ) = pos(z t )- j t + j t- Table 2. Probabilities of the general conditions General condition Probability C /2 n C2 (2 n - )/2 2n C3(p [2, t]) (2 n - ) p- (2 n - p)/2 n (p+) C4(p [2, t]) (2 n ) p- /2 n p C5 (2 n ) t (2 n - t)/2 n (t+) 3 Reconstruction of the RC4 initial table To forulate our attack, we organized the general conditions into the tree structure shown in Figure 2. At given tie t, this tree consists of the nodes distributed at t+ levels. The level zero serves as a tree root only, and its node is fictitious, i.e. it is not exained. Nodes at tree level i, 0 < i t correspond to the 2i+ general conditions at tie i. They represent the general conditions in a decreasing order of their probabilities, and therefore, instead as Ci, are denoted as A k i, k 2i+. By observing this order, a reduction of search space is achieved. - A A - A 2 - A 3 - A 2 A 3 A A 2-2 A A 2- A 2 A 2+ Figure 2. The tree of general conditions The inforation collected up to the given tie represents the current state of the attack. This state contains inforation about paraeters j i and L i, 0 < i t, as well as relations aong the. The general condition has to be exained taking into account the current state. As a consequence of the exaination, a new state, which contains additional inforation, is derived. In that way, the transition fro one state to another is assured, and the aount of inforation increases in each step. When the actual state has sufficient inforation, a part, or the whole initial table is found. To find the RC4 initial table, our algorith applies the basic principle of the hill-clibing search strategy []. This strategy uses the heuristic estiation function to describe how uch the final state is far fro the current state. In our case, it corresponds to the probability that soe general condition leads to the solution. Initially, there is not any inforation (epty current state). The algorith starts with the general conditions represented by the nodes at the first level. These nodes, as well as the nodes at soe other level are exained fro left to right (Figure 2) so that the ost proising states are favoured. Thus, at level k, k we first exained the A node. If the general condition represented by this node is satisfied, a new state is created, and the algorith passes to the first node at the next level, A k+ (denoted by the solid line in Figure 2). Otherwise, if a contradiction occurs, the algorith exaines the next node at the current level, in this case A k 2 (denoted by the dashed line). The siilar holds for all other nodes at the given level. As it can be observed, if the general condition in soe

5 node is successful, then the next node to be exained is always the first one at the next level. Therefore, in Figure 2, the first node at each level is specially denoted as a unique node at the level that can be reached fro the previous level. When the state with all inforation needed for recovering of the initial table is achieved, the algorith stops. The algorith guarantees that the solution will be found. 4 Coplexity Analysis The ain characteristic of each deciphering cryptanalytic algorith is its coplexity. The coplexity is easured by the total nuber of activities or operations that are necessary to perfor until the solution is found. What these activities represent, it depends on the individual algorith. Therefore, one should be very careful in the coparison of different cryptanalytic attacks regarding to their coplexity. For our algorith, the coplexity can be estiated as the nuber of general conditions (or nodes) that has to be exained until the initial cipher table is found. The reason for such a decision lies in the fact that the general condition exaination alters the state of the syste. Therefore, the coplexity actually represents the nuber of states that should be passed. Before we calculate the coplexity of our algorith, we have to deterine the nuber of levels,, in the tree given in Figure 2. This nuber represents the average nuber of output sybols that should be known to find the solution. The node in which the solution is found is et, on the average, at level. By a careful analysis of the general conditions, we concluded that in the path to the solution, each node at one level could precede any node at the next level. The only exception is that the general condition C2 at the first level could not precede the sae condition at the second level. Therefore, for the given output word length n, is the sallest nuber such that: 3. n 4 (2i + ) 2! i= 3 The values of for different n are given in Table Table 3. The required nuber of output sybols n To estiate the coplexity, it is necessary to deterine how any ties on the average each node in the tree given in Figure 2 is exained, and then to su these values. It is convenient to calculate the cuulative for each level in the tree. Let v s (i, k) denote the probability that the i-th node at the level k leads to the solution (Table 2). Then, the coplexity can be calculated in the following way: Coplexity = 0 FirstLeft = /* nuber of ties for the first left node at the level */ For k fro to - /* per level */ CriticalValue = FirstLeft For i fro 2 to 2k+ /* rest of the nodes at the level */ c = For j fro to i- /* to the i-th node */ c = c v s (j, k) CriticalValue = CriticalValue + FirstLeft * c FirstLeft = CriticalValue /* cuulative per level */ Coplexity = Coplexity + CriticalValue As can be seen, the cuulative value for one level (FirstLeft) represents the average nuber of exainations of the first node at the next level. The nuber of exainations of reaining nodes at the level is calculated by ultiplying the nuber that corresponds to the first node at this level, and the probability that the given node is reached, i.e. none of preceding nodes at this level was satisfied. The results obtained for the RC4 versions with different word size n are presented in Table 4. Although a significant iproveent over exhaustive search has been ade, it is still not enough to practically enace the security of the RC4 strea cipher. Table 4. The coplexity of cryptanalytic attack n our algorith exhaustive search 3.6* * * * * * * * * * * * Conclusions We have proposed a new cryptanalytic attack on the RC4 strea cipher. This attack finds the RC4 initial table using the inforation extracted fro the tree representation of the RC4 algorith. The inforation is analytically represented by eans of general conditions. Further, we have defined the tree of general conditions, which is searched using the hill-

6 clibing strategy. The aount of inforation increases in each step. After a sufficient aount of inforation is collected, it is possible to find ore unknown initial table entries at once. The coplexity of our attack was estiated by an analytical calculation. The results give us an additional arguent, which advocates for the security of the RC4 strea cipher. Our further research efforts will be devoted to investigating whether the inforation available in our algorith can help to iprove the tracking algoriths given in [8] and [9]. Acknowledgeents This work has been partially funded by the Spanish Ministry of Science and Technology under project nuber TIC C Dr. S. Bojanić is also supported through the "Raón y Cajal" progra fro the sae institution. References: [] B. Schneier, Applied Cryptography, Willey, New York, 996. [2] V. Toašević, S. Bojanić and O. Nieto-Taladriz, On the Cryptanalysis of Alleged RC4 Strea Cipher, in C. Anias and Y. Leido (eds.): Teleatics and its applications in distance education and inforatization of the society, vol., pp Havana: Editorial Universitaria Félix Varela, [3] J. Golić, Linear Statistical Weakness of Alleged RC4 Keystrea Generator, Advances in Cryptology - EUROCRYPT 997, LNCS, Vol. 233, Springer-Verlag, pp [4] S. Fluhrer, D. McGrew, Statistical Analysis of the Alleged RC4 Keystrea Generator, Fast Software Encryption - FSE [5] A. Roos, A Class of Weak Keys in the RC4 Strea Cipher, sci.crypt, Septeber 995. [6] A. Grosul, D. Wallach, A Related-Key Cryptanalysis of RC4, October [7] S. Fluhrer, I. Mantin, A. Shair, Weakness in the Key Scheduling Algorith of RC4, Selected Areas in Cryptography - SAC 200, LNCS 200. [8] L. Knudsen, W. Meier, B. Preneel, V. Rijen, S. Verdoolaege, Analysis Methods for (Alleged) RC4, Advances in Cryptology - ASIACRYPT 998, LNCS 54. [9] S. Mister, S. Tavares, Cryptanalysis of RC4-like Ciphers, Selected Areas in Cryptography - SAC 998, Kingston, Canada, pp [0] I. Mantin, A. Shair, A Practical Attack on Broadcast RC4. Fast Software Encryption, 8th International Workshop, FSE 200 Yokohaa, Japan, April 2-4, 200, Lecture Notes in Coputer Science 2355, p , Springer [] J. Pearl, Heuristics, Addison Wesley Publishing Copany, 984.

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Statistical Analysis of the Alleged RC4 Keystream Generator

Statistical Analysis of the Alleged RC4 Keystream Generator Statistical Analysis of the Alleged RC4 Keystream Generator Scott R. Fluhrer and David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134 {sfluhrer, mcgrew}@cisco.com Abstract. The

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

Medical Biophysics 302E/335G/ st1-07 page 1

Medical Biophysics 302E/335G/ st1-07 page 1 Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

A Study of the Relationship Between Support Vector Machine and Gabriel Graph

A Study of the Relationship Between Support Vector Machine and Gabriel Graph A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

A Small Initial Investigation into a Key-dependent Random Permutation with an Example in PRESENT

A Small Initial Investigation into a Key-dependent Random Permutation with an Example in PRESENT International Journal of Coputer and Inforation Technology (ISSN: 79 764) Volue 7 Issue, January, 8 A Sall Initial Investigation into a Key-dependent Rando Perutation with an Exaple in PRESENT D. Dhebar

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

An Automatic Method for Summary Evaluation Using Multiple Evaluation Results by a Manual Method

An Automatic Method for Summary Evaluation Using Multiple Evaluation Results by a Manual Method An Autoatic Method for Suary Evaluation Using Multiple Evaluation Results by a Manual Method Hidetsugu Nanba Faculty of Inforation Sciences, Hiroshia City University 3-4-1 Ozuka, Hiroshia, 731-3194 Japan

More information

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT 1 MANIKANDAN.G, 2 MANIKANDAN.R, 3 RAJENDIRAN.P, 4 KRISHNAN.G, 5 SUNDARGANESH.G 1 Assistant Professor, School of Computing, SASTRA University,

More information

DKD-R 4-2 Calibration of Devices and Standards for Roughness Metrology Sheet 2: Calibration of the vertical measuring system of stylus instruments

DKD-R 4-2 Calibration of Devices and Standards for Roughness Metrology Sheet 2: Calibration of the vertical measuring system of stylus instruments DKD-R 4- Calibration of Devices and Standards for Roughness Metrology Sheet : Calibration of the vertical easuring syste of stylus instruents DKD-R 4- Sheet.7 DKD-R 4- Calibration of Devices and Standards

More information

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE 7. FRESNEL DIFFRACTION ON A ROUND APERTURE. Objective Exaining diffraction pattern on a round aperture, deterining wavelength of light source.. Equipent needed Optical workbench, light source, color filters,

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

A New Generic Model for Vision Based Tracking in Robotics Systems

A New Generic Model for Vision Based Tracking in Robotics Systems A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Simulated Sensor Reading. Heading. Y [m] local minimum ; m. local maximum ; M. discontinuity ; D. connection ; c X [m]

Simulated Sensor Reading. Heading. Y [m] local minimum ; m. local maximum ; M. discontinuity ; D. connection ; c X [m] Localization based on Visibility Sectors using Range Sensors Sooyong Lee y Nancy. Aato Jaes Fellers Departent of Coputer Science Texas A& University College Station, TX 7784 fsooyong,aato,jpf938g@cs.tau.edu

More information

Available online at Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012

Available online at   Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012 Available online at www.sciencedirect.co Procedia Coputer Science 9 (2012 ) 1363 1370 Abstract International Conference on Coputational Science, ICCS 2012 Reachability Analysis of Concurrent Boolean Progras

More information

DIGITAL RECTIFICATION AND GENERATION OF ORTHOIMAGES IN ARCHITECTURAL PHOTOGRAMMETRY

DIGITAL RECTIFICATION AND GENERATION OF ORTHOIMAGES IN ARCHITECTURAL PHOTOGRAMMETRY DIGITAL RECTIFICATION AND GENERATION OF ORTHOIMAGES IN ARCHITECTURAL PHOTOGRAMMETRY MATTHIAS HEMMLEB Fokus GbH, Färberstr. 13, D-04105 Leipzig, Gerany E-ail: atti@fpk.tu-berlin.de ALBERT WIEDEMANN Technical

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Development of an Integrated Cost Estimation and Cost Control System for Construction Projects

Development of an Integrated Cost Estimation and Cost Control System for Construction Projects ABSTRACT Developent of an Integrated Estiation and Control Syste for Construction s by Salan Azhar, Syed M. Ahed and Aaury A. Caballero Florida International University 0555 W. Flagler Street, Miai, Florida

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium wu.hongjun,bart.preneel@esat.kuleuven.be

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

CLUSTERING OF AE SIGNAL AMPLITUDES BY MEANS OF FUZZY C-MEANS ALGORITHM

CLUSTERING OF AE SIGNAL AMPLITUDES BY MEANS OF FUZZY C-MEANS ALGORITHM The 12 th International Conference of the Slovenian Society for Non-Destructive Testing»Application of Conteporary Non-Destructive Testing in Engineering«Septeber 4-6, 213, Portorož, Slovenia More info

More information

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping

More information

The Boundary Between Privacy and Utility in Data Publishing

The Boundary Between Privacy and Utility in Data Publishing The Boundary Between Privacy and Utility in Data Publishing Vibhor Rastogi Dan Suciu Sungho Hong ABSTRACT We consider the privacy proble in data publishing: given a database instance containing sensitive

More information

Construction of a regular hendecagon by two-fold origami

Construction of a regular hendecagon by two-fold origami J. C. LUCERO /207 Construction of a regular hendecagon by two-fold origai Jorge C. Lucero 1 Introduction Single-fold origai refers to geoetric constructions on a sheet of paper by perforing a sequence

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Approximate String Matching with Reduced Alphabet

Approximate String Matching with Reduced Alphabet Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

Predicting x86 Program Runtime for Intel Processor

Predicting x86 Program Runtime for Intel Processor Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information