ABC: Analyzing Loop Bounds and Complexities
|
|
- Esther Shelton
- 5 years ago
- Views:
Transcription
1 ABC: Analyzing Loop Bouns an Coplexities Régis Blanc, Thoas A. Henzinger, Thibau Hottelier, an Laura Kovács EPFL, Switzerlan Abstract. We present ABC, a software tool for autoatically coputing sybolic upper bouns on the nuber of iterations of progra loops. The syste cobines static analysis of progras with sybolic suation techniques to erive loop invariant relations aong progra variables. Iteration bouns are obtaine fro the inferre invariants, by substituting variables with their greatest values. We have successfully applie ABC to a large nuber of exaples. The erive sybolic bouns express non-trivial polynoial relations over loop variables. We also report on results to autoatically infer sybolic expressions over haronic nubers as upper bouns on loop iteration counts. 1 Introuction Establishing tight upper bouns on the execution ties of progras is both ifficult an interesting, see e.g. [6,, 5, 1]. We present ABC, a new software tool for autoatically coputing tight sybolic upper bouns on the nuber of iterations of progra loops. The erive bouns express polynoial relations over loop variables. ABC is fully autoatic, cobines static analysis of progras with sybolic suation techniques, an requires no user-guiance in proviing aitional set of preicates, teplates an assertions. ABC is also able to erive sybolic expressions over haronic nubers as upper bouns on loop iteration counts, which, to the best of our knowlege, is not yet possible by other works. In our approach to boun coputation, we have ientifie a special class of neste loop progras, calle the ABC-loops (Section 3.1). Further, we have built a loop converter to transfor, whenever possible, arbitrary loops into their equivalent ABC-loop forat (Section 3.). Inforally, an ABC-loop is a neste for-loop such that each loop fro the neste loop contains exactly one iteration variable with only one conition an (non-initializing) upate on the iteration variable. For such loops, our etho erives exact bouns on the nuber of loop iterations. We assue that each progra stateent is annotate with the tie units it nees to be execute. For siplicity, we assue that an iteration of an unneste loop takes one unit tie, an all other instructions of the unneste loop nee zero tie. The key steps of our approach to boun coputation are as follows (Section 3.3). (i) First, we instruent the innerost loop boy of an ABC-loop with a new variable that increases at every iteration of the progra. We enote this variable by z. Upper bouns on the value of z thus express upper bouns on the nuber of loop iterations. (ii) Next, the value of z is copute as a polynoial function over the neste loop s iteration variables. We call the relation between z an loop s iteration variables the z-relation. To this en, for each loop of the ABC-loop recurrence equations of z an loop iteration variables are first constructe. Close fors of variables are then erive using our This research was supporte by the Swiss NSF.
2 Loop Sybolic Sus Sybolic Solver Close Fors Loop Converter ABC Loop Boun Coputer z-relation Fig. 1. The ABC tool. sybolic solver which integrates special techniques fro sybolic suation (Section 3.4). The erive close fors express vali relations aong z an loop iteration variables, an thus the z-relations are loop invariant properties. (iii) Further, by substituting loop iteration variables by their greatest values in the copute z-relation, bouns on the value of z are obtaine. These bouns give us tight sybolic upper bouns on the nuber of iterations of the progra. Our etho can be generalize for the tiing analysis of loops whose iteration bouns involve haronic expressions over the loop variables (Section 3.5). Ipleentation. ABC was ipleente in the the Scala prograing language [11], contains altogether 5437 lines of Scala coe, an is available at Inputs to ABC are loops written in the Scala syntax. ABC first rewrites the input loop into an equivalent ABC-loop by using its loop converter, an then coputes bouns on loop iteration counts using its boun coputer. The boun coputer relies on the sybolic solver in orer to erive close fors of sybolic sus an siplify atheatical expressions. The overall workflow of ABC is given in Figure 1. Note that we o not rely on external coputer algebra package for sybolic suation. Experients. We successfully applie ABC on exaples fro [6, 5], as well as on ninety loops extracte fro the JAMA package [8] see the appenix an entione URL. Altogether, we ran ABC on 558 lines of JAMA. ABC copute exact upper bouns on iteration counts for all loops, an inferre the z-relation for eighty-seven loops, all in less than one secon on a achine with a.8 GHz Intel Core Duo processor an GB of RAM. The three loops for which ABC was not able to erive the z-relation were actually sequences of loops. Relate Work. We only present soe of the nuerous ethos that are relate to ABC. Paper [9] infers polynoial loop invariants aong progra variables by using polynoial invariant teplates of boune egree. Unlike [9] where no restrictions on the consiere loops were ae, we require no user guiance in proviing invariant teplates but autoatically erive invariants (z-relations) for a restricte class of loops. The approach presente in [7] infers invariants an boun assertions for loops with neste conitionals, by eploying sybolic coputations techniques. Neste loops cannot be hanle in [7]. In contrast, we infer boun assertions as z-relations for neste loops, but, unlike [7], our assertions are only over loop iteration variables an not arbitrary progra variables. Paper [6] erives iteration bouns of neste loops by pattern atching siple recurrence equations. Contrarily to [6], we solve ore general recurrence equations using the Gosper algorith an ientities over haronic nubers.
3 for (i = 1; i n; i = i + 1) o for (j = 1; j n; j = j + 1) o (a) for (i = 0; i n; i = i + 1) o for (j = 0; j ; j = j + ) o (b) Fig.. Exaples illustrating the power of ABC to (i) copute z-relations as loop invariants, an (ii) infer tight upper bouns on the nuber of iterations of loops. Sybolic upper bouns on iteration counts of ulti-path loops are autoatically erive in [1]. The approach eploys control-flow refineent ethos to eliinate infeasible loop paths an rewrite ulti-path loops into a collection of sipler loops for which boun assertions are inferre using abstract interpretation techniques [1]. The progras hanle by [1] are ore general than the ABC-loops. Unlike [1], we o not rely on abstract interpretation, an are able to infer haronic expressions as upper bouns on loop iterations counts. There has been a great eal of research on estiating the worst case execution tie (WCET) of real-tie systes, see e.g. [, 5]. The cite works autoatically infer loop bouns only for siple loops; bouns for the iteration nubers of ulti-path loops ust be provie as user annotations. The ait tool [] eterines the nuber of loop iterations by relying on a cobination of interval-base abstract interpretation with pattern atching on typical loop patterns. The SWEET tool [5] eterines upper bouns on loop iterations by unrolling loops ynaically an analyzing each loop iteration separately using abstract interpretation. In contrast, our etho is fully autoatic an path-insensitive, but it is restricte to ABC-loops. Motivating Exaples We first give soe exaples illustrating what kin of iteration bouns ABC can autoatically generate. Consier Figure (a) taken fro the JAMA library [8]. ABC first instruents the innerost loop of Figure (a) with a new variable z, initialize to 1, for counting the nuber of iterations of Figure (a). The such obtaine loop is presente in Figure 3(a). Further, by applying ABC on Figure 3(a), we erive the z-relation 1 z = (i 1)n + j as an invariant property of the loop. By substituting i an j with their greatest values (i.e. n) in the z-relation, the nuber of iterations of Figure (a) is boune by n. Consier next Figure (b) with a non-unit increent, an its instruente version in Figure 3(b). We obtain the z-relation: z = 1 + ( j + i ) + 1, yieling: 1 + (1 + n) + n as a tight upper boun on loop iteration counts, where enotes the largest integer not greater than. In the sequel, we illustrate the ain steps of ABC on Figure (b). 1 Actually, the loops of Figure are first translate into their equivalent ABC-forat, an then the z variable is introuce in their innerost loop boy. For siplicity, in Figure 3 we present the instruentation step irectly on the loops of Figure an not on their ABC-loop forats. In our work we i not consier analyzing the relations between the sallest an greatest sybolic values of the loop iteration variables. It ay be however the case that these sybolic values are such that the loops are never execute (e.g. n < 0).
4 z = 1 for (i = 1; i n; i = i + 1) o for (j = 1; j n; j = j + 1) o z = z + 1 (a) z = 1 for (i = 0; i n; i = i + 1) o for (j = 0; j ; j = j + ) o z = z + 1 (b) 3 ABC: Syste Description Fig. 3. Figure instruente by ABC We have ientifie a special class of loops, calle the ABC-loops (Section 3.1), an esigne a loop converter for translating progras into their equivalent ABC-loop shape (Section 3.). Algorithic ethos fro sybolic suation, ipleente in our sybolic solver (Section 3.4), are further eploye in ABC to autoatically erive upper bouns on loop iterations of ABC-loops (Section 3.3). 3.1 ABC-Loops We enote by Z the set of integer nubers, an by Z[x] the ring of polynoial functions in ineterinate x over Z. We consier progras of the following for: for (i 1 = 1; i 1 c; i 1 = i 1 + 1) o for (i = 1; i f 1(i 1); i = i + 1) o for (i = 1; i f 1 (i 1,, i 1 ); i = i + 1) o (1) where i 1,, i are pairwise isjoint scalar variables (calle loop iteration variables) with values fro Z, c is an integer-value sybolic constants, an f k Z[i 1,, i k ] are polynoial functions (k = 1,, 1). In what follows, loops satisfying (1) will be calle ABC-loops. 3. The Loop Converter Converting loops into ABC-loops is one as presente in Algorith 1. The algorith (i) converts loops into equivalent ones such that the sallest values of the loop iteration variables are 1, an (ii) converts loops with arbitrary increents over the iteration variables into equivalent loops with increents of 1. In ore etail, Algorith 1 takes as input a neste for-loop F an an epty list conversion list, an returns, whenever possible, an ABC-loop F that is equivalent to F. The conversion list is use to store the list of changes ae by Algorith 1 on the iteration variables of F. Lines 4-9 of Algorith 1 are require to convert F into an equivalent loop whose outerost loop has the following properties: it iterates over a new variable nvar instea of the iteration variable ovar of the outerost loop of F, where nvar an ovar are polynoially relate; the sallest value of nvar is 1 (instea of the sallest value olboun of ovar); nvar is increent by 1 (instea of the oincr increent value of ovar); the greatest value of nvar is given by the largest integer not greater than the rational expression ouboun olboun oincr + 1, where ouboun is the
5 Algorith 1 Loop Converter Input: For-loop F an conversion list = {} Output: ABC-loop F an conversion list 1: ovar, oincr := outer iteration variable(f ), outer iteration increent(f ) : olboun, ouboun := outer iteration lowerboun(f ),outer iteration upperboun(f ) 3: nvar:= fresh variable() 4: F 0:= loop boy(f ) /. (ovar oincr (nvar + olboun 1 ) ) 5: conversion list:=conversion list {ovar = oincr (nvar + olboun 1 ) } 6: if isloop(f 0) then 7: F := for-loop(nvar, 1, ouboun olboun oincr + 1, 1, Loop Converter(F0)) 8: else 9: F := for-loop(nvar, 1, ouboun olboun oincr + 1, 1, F0) 10: en if greatest value of ovar. The (appropriately oifie 3 ) loop boy F 0 of F is processe in the siilar anner, yieling finally the ABC-loop F that is equivalent to F. The for loop(v, e 1, e, e 3, boy) notation is a short-han notation for the loop for (v = e 1 ; var e ; var = var + e 3 ) o boy. Exaple 1 Consier Figure (b). By applying Algorith 1, the loop iteration variables i 1 an j 1 are introuce with i = i 1 1 an j = (j 1 1) (lines 3-5 of Algorith 1). The sallest values of i 1 an j 1 are 1, their greatest values are respectively n + 1 an + 1, an i 1 an j 1 are increente by 1 (lines 6-9 of Algorith 1). The ABC-loop forat of Figure (b) is given in Figure 4(a). Base on Algorith 1 an keeping the notations of (1), we conclue that the general shape of loops that can be converte into ABC-loops is: for (i 1 = l; i 1 c; i 1 = i 1 + inc 1) o for (i = g 1(i 1); i f 1(i 1); i = i + inc ) o for (i = g 1 (i 1,, i 1 ); i f 1 (i 1,, i 1 ); i = i + inc ) o where l, inc 1,, inc are integer-value sybolic constants, an g k Z[i 1,, i k ]. 3.3 The Boun Coputer We assue that each progra stateent is annotate with the tie units it nees to be execute. For siplicity, we assue that an iteration of an unneste ABC-loop takes one unit tie, an all other instructions of the unneste loop nee zero tie (e.g. assignent stateents take zero tie to be execute). That is we copute a boun on the total nuber of loop iterations of an ABC-loop (1). 3 The expression e 1/.x e is obtaine fro e 1 by substituting each occurrence of the variable x by the expression e. ()
6 for (i 1 = 1; i 1 n + 1; i 1 = i 1 + 1) o for(j 1 = 1; j 1 + 1; j1 = j1 + 1) o (a) z = 1 for (i 1 = 1; i 1 n + 1; i 1 = i 1 + 1) o for(j 1 = 1; j 1 + 1; j1 = j1 + 1) o z := z + 1 (b) Fig. 4. ABC-loop forat of Figure(b) an its instruente version, where i = i 1 1 an j = (j 1 1). Note that / Z., In our approach to boun coputation, we instruent the innerost loop boy of (1) with a new variable that increases at every iteration of the progra, an is initialize to 1 before entering the ABC-loop. We enote this variable by z. We hence obtain: for (i 1 = 1; i 1 c; i 1 = i 1 + 1) o for (i = 1; i f 1 (i 1,, i 1 ); i = i + 1) o z := z + 1 (3) Exaple The instruente loop of Figure 4(a) is given in Figure 4(b). Upper bouns on the value of z give upper bouns on the nuber of iterations of (3). We are hence left with coputing the value of z as a function, calle the z-relation, over i 1,, i. To this en, the value of z at an arbitrary iteration of the outerost loop of (3) is first copute. Coputing the value of z after an arbitrary iteration of the outerost loop of (3). Let us consier a ore general loop than (3): for (i 1 = 1; i 1 c; i 1 = i 1 + 1) o for (i = 1; i f 1(i 1); i = i + 1) o for (i = 1; i f 1 (i 1,, i 1 ); i = i + 1) o z := z + g(i ) (4) where i 1,, i, c, f 1,, f 1 are as in (1), an g Z[i ]. In particular, if g = 1 then (4) becoes (3). Let s 1,, s l be nonnegative integers (l = 1,, ) such that 1 s 1 c, 1 s f ( i 1 ),, an 1 s l f l 1 (i 1,, i l 1 ). In the sequel we consier s 1,, s l arbitrary but fixe. We write x (l, s1,...,sl ) to ean the value of a variable x {i 1,, i, z} in (4) such that the kth loop of (4) is at its s k th iteration (k = 1,, l), We are thus intereste in eriving z (1, s1 ) for s 1 {1,, c}. We procee as follows. For each loop of (4), starting fro the innerost one, we (i) oel the assignent over z as a recurrence equation, (ii) eploy sybolic suation algoriths to copute the close for of z, an (iii) replace the loop by a single assignent over z expressing
7 the relation between the values of z before the first an after the last execution of the loop. Steps (i)-(iii) are recursively applie until all loops of (4) are eliinate. In ore etail, z (1, s1 ) is erive as follows. We start with the innerost loop of (4). The assignent over z is oele by the recurrence equation: z (, s1,...,s +1 ) = z (, s1,...,s ) + g(i (, s1,...,s 1 ) ), (5) yieling z (, s1,...,s ) = ini z + s g(i(, s1,...,k 1 ) ), where ini z = z (, s1,...,0 ) enotes the value of z before entering the innerost loop of (4). The value of i (, s1,...,s ) is copute fro the recurrence equation i (, s1,...,s +1 ) = i (, s1,...,s ) +1. Naely, we have i (, s1,...,s ) = ini + s 1, where ini = 1 enotes the initial value of i (i.e. before the first iteration of the innerost loop of (4)). Hence, i (, s1,...,s ) = s + 1. (6) Note that (6) hols for each iteration variable, that is i (l, s1,...,s l ) l = s l + 1 for every l {1,, }. For this reason, in what follows we write i l instea of i (l, s1,...,s l ) l an use the relation i l = s l + 1 to speak about the value of i l at iteration s l of the lth loop. We thus obtain z (, s1,...,s ) = ini z + s g(i(, s1,...,k 1 ) ) = ini z + i 1 g(k) Since g Z[i ], the close for of i 1 g(k) always exists [3] an can be copute as a polynoial function over i (see Section 3.4). Finally, we consier the last iteration s = i 1 = f 1 (i 1,, i 1 ) of the innerost loop of (4), an write incr = f 1 (i 1,...,i 1 ) g(k). We ake use of incr Z[i 1,, i 1 ] to eliinate the innerost loop of (4) an obtain: for (i 1 = 1; i 1 c; i 1 = i 1 + 1) o for (i 1 = 1; i 1 f 1 (i 1,, i ); i 1 = i 1 + 1) o z := z + incr Inner loops of (7) can be further eliinate by applying recursively the steps escribe above, since close fors of polynoial expressions over i 1,, i yiel polynoial expressions over i 1,, i whenever the suation variables are boune by polynoial expressions. As a result, the total nuber of increents over z in the s 1 th iteration of the outerost loop of (4) is erive. Let us enote this nuber by incr 1. Then: z (1, s1 ) = z 0 + incr 1, where z 0 = 1 is the value of z before (4). Exaple 3 Consier Figure 4(b). We ai at eriving z (1, s1 ), where 1 s 1 n+1 is arbitrary but fixe such that i 1 = s Fro the innerost loop of Figure 4(b) we get z (, s1,s+1 ) = z (, s1,s ) + 1 for an arbitrary but fixe s, where 1 s + 1 an j 1 = s + 1. Hence, z (, s1,s ) = ini + j 1 1, where ini is the initial value of z before entering the innerost loop. Further, after s = j 1 1 = + 1 iterations of the innerost loop, the total nuber of increents over z is incr = +1 1 = + 1. The innerost loop of Figure 4(b) is next eliinate, yieling: (7)
8 Algorith Boun Coputer Input: ABC-loop F, initial value z 0 of z Output: z-relation zrel 1: inner:= loop boy(f ) : incr:= z reuce loop(inner) 3: ovar, ouboun := outer iteration variable(f ),outer iteration upperboun(f ) 4: nvar:= fresh variable() 5: z i:=z 0 + solve su(nvar, 1, ovar 1, incr/.(ovar nvar)) 6: if isloop(inner) then 7: zrel:= z =Boun Coputer(inner, z i) 8: else 9: zrel:=z = z i 10: en if for (i 1 = 1; i 1 n + 1; i 1 = i 1 + 1) o z = z with the recurrence equation of z as z (1, s1 +1) = z (1, s1 ) Solving this recurrence an using that z 0 = 1 is the initial value of z before the outerost loop of Figure 4(b), we obtain: z (1, s1 ) = 1 + i 1 1 ( + 1) = 1 + (i 1 1) ( + 1). Coputing the z-relation aong arbitrary values of z, i 1,, i. We are intereste in eriving the value of z (, s1,...,s ), where i k = s k + 1 (k = 1,, ), fro which the z-relation can be ieiately constructe as z = z (, s1,...,s ). The value z (, s1,...,s ) (an hence the z-relation) is inferre by Algorith as follows. (a) The value incr is copute s.t. z (1, s1 ) = z 0 + incr (line of Algorith ); (b) The outerost loop of (4) is oitte (line 1 of Algorith ), yieling: for (i = 1; i f 1(i 1); i = i + 1) o for (i = 1; i f 1 (i 1,, i 1 ); i = i + 1) o z := z + g(i ) (c) The value of z at the s n iteration of the outerost loop (8) is next copute, where the initial value of z before (8) is consiere to be z (1, s1 ) (line 7 of Algorith ). As a result, z (, s1,s ) in the loop (4) is obtaine. () Steps (b)-(c) are recursively applie on (8) (lines 6-9 of Algorith ). Exaple 4 Consier Figure 4(b). The outerost loop of Figure 4(b) is oitte (line 1 of Algorith ), yieling: for(j 1 = 1; j 1 + 1; j 1 = j 1 + 1) o z = z + 1 (9) The total nuber of increents incr = + 1 over z ae by (9) is copute, as presente in Exaple 3 (line of Algorith ). The value z i = z (1, s1 ) of z at an iteration s 1 = i 1 1 of the outerost loop of Figure 4(b) is further copute as z i = z 0 + i 1 1 ( nvar=1 + 1) = 1 + (i 1 1) ( + 1) (lines 3-5 of Algorith ). (8)
9 for (i = 1; i n; i = i + 1) for (j = 0; j n; j = j + i) for(i 1 = 1; i 1 n; i 1 = i 1 + 1) for(j 1 = 1; j 1 n 1; j 1 = j 1 + 1) z := z + 1 for(i 1 = 1; i 1 n; i 1 = i 1 + 1) for(j 1 = 1; j 1 n 1; j 1 = j 1 + 1) z := z + 1 (a) Not an ABC-loop (b) Converte loop by ABC with (c) Instruente loop by ABC n 1 = n i + 1, an i = i 1 1, j = i j 1 Fig. 5. ABC on a non-abc-loop. Next, Algorith is calle on (9) with the initial value z i to copute the value of z at an iteration s = j 1 1 of (9) (line 7 of Algorith ). As (9) has no inner loops, we have incr = 1 an z i = z i + j 1 1 nvar=1 1, yieling z(, s1,s ) = z i = (i 1 1) ( + 1) + j 1 (lines -5 of Algorith ). The z-relation of Figure 4(b) is finally erive as z = (i 1 1) ( + 1) + j 1 (line 9 of Algorith ). To obtain the z-relation of Figure (b), we ake use of i = i 1 1 an j = (j 1 1) an have: z = i ( ) j + 1. Substituting i an j with n an in the z- relation, the upper boun on loop iteration counts of Figure (b) is: (n + 1) ( ) Sybolic Solver Siplifying arithetical expressions an coputing close fors of sybolic sus is perfore by the sybolic solver engine of ABC. Our sybolic solver supports the close for coputation of the following sus: e x=e 1 c 1 n x 1 x c r n x r x r where e 1, e are integer-value sybolic constants, n i, i are natural nubers, an c i are rational nubers. Close fors of such sus always exists [3]. For coputing the close fors of these sus we rely on a siplifie version of the Gosper algorith [3]. We have also instruente our sybolic solver to hanle sybolic sus whose close fors involve haronic nubers [4], as iscusse in Section Beyon ABC-Loops ABC is coplete for ABC-loops an for loops satisfying (). That is, it always returns the z-relation an loop iteration boun of an ABC-loop. It is worth to be entione that soe loops violating () can still be successfully analyze by ABC. Consier Figure 5(a) violating (), as upates over j epen on i. However, using Algorith 1 we erive the loop given in Figure 5(b), yieling finally the instruente loop fro Figure 5(c). Further, by applying Algorith, we are left n i 1. This su cannot be further siplifie [4]. with fining the close for of i 1 1 However, we can copute an upper-boun on its close for using the relation: i 1 1 n i 1 i1 1 i 1 n = n i 1 1 i 1 1. Note that i i 1 is the haronic nuber H(i 1 1) arising fro the truncation of the haronic series [4]. We ake use of H(i 1 1) an erive an upper boun on the
10 loop iteration count of Figure 5(a) as being a haronic expression. To this en, we have extene our sybolic solver with soe siple ientities over haronic nubers. ABC can be thus successfully applie to loops for which sybolic coputation ethos can be eploye to copute or approxiate close fors of loop variables. 4 Conclusions We escribe the software tool ABC for autoatically eriving tight sybolic upper bouns on loop iteration counts of a special class of loops, calle the ABC-loops. The syste was successfully trie on a large nuber of exaples. The erive sybolic bouns express non-trivial (polynoial an haronic) relations over loop variables. Future work inclues extening ABC to hanle ore coplex sus, such as e.g. fractions of polynoials [10], an incluing ore sophisticate control-flow refineent techniques, such as [1], into ABC. References 1. P. Cousot an R. Cousot. Abstract Interpretation: a Unifie Lattice Moel for Static Analysis of Progras by Construction or Approxiation of Fixpoints. In Proc. of POPL, pages 38 5, C. Ferinan an R. Heckann. ait: Worst Case Execution Tie Preiction by Static Progra Analysis. In IFIP Congress Topical Sessions, pages , R. W. Gosper. Decision Proceures for Inefinite Hypergeoetric Suation. Journal of Sybolic Coputation, 75:40 4, R. L. Graha, D. E. Knuth, an O. Patashnik. Concrete Matheatics. Aison-Wesley Publishing Copany, n eition, J. Gustafsson, A. Ereahl, C. Sanberg, an B. Lisper. Autoatic Derivation of Loop Bouns an Infeasible Paths for WCET Analysis Using Abstract Execution. In RTSS, pages 57 66, C. A. Healy, M. Sjöin, V. Rustagi, D. B. Whalley, an R. van Engelen. Supporting Tiing Analysis by Autoatic Bouning of Loop Iterations. Real-Tie Systes, 18(/3):19 156, T. A. Henzinger, T. Hottelier, an L. Kovacs. Valigator: A Verification Tool with Boun an Invariant Generation. In Proc. of LPAR, pages , J. Hicklin, C. Moler, P. Webb, R. F. Boisvert, B. Miller, R. Pozo, an K. Reington. JAMA: A Java Matrix Package M. Müller-Ol, M. Petter, an H. Seil. Interproceurally Analyzing Polynoial Ientities. In Proc. of STACS 006, I. Nees an M. Petkovsek. RCop: A Matheatica Package for Coputing with Recursive Sequences. Journal of Sybolic Coputation, 0(5-6): , M. Oersky. The Scala Language Specification S. Srivastava an S. Gulwani. Progra Verification using Teplates over Preicate Abstraction. In Proc. of PLDI, pages 3 34, R. A. van Engelen, J. Birch, an K. A. Gallivan. Array Data Depenence Testing with the Chains of Recurrences Algebra. In Proc. of IWIA, pages 70 81, 004.
11 Appenix: Experiental Results with ABC Loop z-relation Iteration boun Tie [s] for(i = a; i b; i = i + 1) for(i = 0; i n 1; i = i + 1) for(j = 0; j i; j = j + 1) for(i = 1; i ; i = i + 1) for(j = 1; j i; j = j + 1) for(k = i + 1; k ; k = k + 1) for(l = 1; l k; l = l + 1) for(i = 0; i ( n n n 1); i = i + 1) for(j = 0; j n 1; j = j + 1) for(k = 0; k j 1; k = k + 1) for(i = 1; i n; i = i + 1) for(j = 1; j i; j = j + 1) for(i = 1; i n; i = i + 1) for(j = i; j n; j = j + 1) for(i = a; i b; i = i + 1) for(j = c; j ; j = j + 1) for(k = i j; k i + j; k = k + 1) for(i = n; i 1; i = i 1) for(j = ; j 1; i = j 1) z = 1 + i a 1 + b a z = 1 + j + i+i z = i i +i i 4 + i i i3 i 1 + j+j +k +ji +ji++k + 1 z = 1 + k + in in+j j z = i i + j z = (i 1)n + j + i i z = 1 a + i a + i + ac ic + j c + j a + k n+n n 4 n 4 n +n n +n 1 + b a c + bc +ac +b a + b a z = (n i+1) j+1 n 3 Table 1. ABC results obtaine on a achine with a.8 GHz Intel Core Duo processor an GB of RAM. The first four progras of Table 1 are exaples taken fro [13], whereas the last four progras of Table 1 are loops taken fro the JAMA package [8]. The first colun of Table 1 presents the loop being fe into ABC, the secon colun shows the z-relation erive by ABC, whereas the thir one presents the nuber of loop iterations copute by ABC. The forth colun gives the tie neee by ABC to infer bouns on loop iteration counts. Note that iteration bouns are integer-value polynoial expressions (e.g. n + n is ivisible by )
A Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationTrees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]
CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority
More informationSmarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math
Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents
More informationarxiv: v1 [math.co] 10 Aug 2016
LOWER BOUNDS FOR ON-LINE INTERVAL COLORING WITH VECTOR AND CARDINALITY CONSTRAINTS GRZEGORZ GUTOWSKI AND PATRYK MIKOS arxiv:1608.03078v1 [ath.co] 10 Aug 2016 Abstract. We propose two strategies for Presenter
More informationr-tubound: Loop Bounds for WCET Analysis (tool paper)
r-tubound: Loop Bounds for WCET Analysis (tool paper) Jens Knoop, Laura Kovács, and Jakob Zwirchmayr TU Vienna Abstract. We describe the structure and the usage of a new software tool, called r-tubound,
More informationA simplified approach to merging partial plane images
A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D
More informationCS 361 Meeting 8 9/24/18
CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages
More informationAN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS
AN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS Caixia Wang, Peggy Agouris, Anthony Stefaniis Center for Earth Observing an Space Research Departent of Earth Systes an Geoinforation
More informationPrivacy-preserving String-Matching With PRAM Algorithms
Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology
ELEN 689-603: Project Progress eport Second Order Delay Coputation for C networks wi Non-Tree Topology ajeshwary Tayade 000 07 573 //003 PDF created wi pdffactory trial version www.pdffactory.co : Introduction
More informationAvailable online at Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012
Available online at www.sciencedirect.co Procedia Coputer Science 9 (2012 ) 1363 1370 Abstract International Conference on Coputational Science, ICCS 2012 Reachability Analysis of Concurrent Boolean Progras
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationFeature Based Registration for Panoramic Image Generation
IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationVerifying the structure and behavior in UML/OCL models using satisfiability solvers
IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationTree Interpolation in Vampire
Tree Interpolation in Vampire Régis Blanc 1, Ashutosh Gupta 2, Laura Kovács 3, and Bernhard Kragl 4 1 EPFL 2 IST Austria 3 Chalmers 4 TU Vienna Abstract. We describe new extensions of the Vampire theorem
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationHomework 1. An Introduction to Neural Networks
Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the
More informationWAVE OPTICS. Conceptual Questions Because ym
WAVE OPTICS Conceptual Questions.. The initial light pattern is a ouble-slit interference pattern. It is centere behin the ipoint of the slits. The slight ecrease in intensity going outwar fro the ile
More informationMAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer
MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationSmarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math
Sarter Balanced Assessent Consortiu Clais, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationArtifacts Reduction in Image Rendering of the Focused Plenoptic Camera Peng Liu 1, Rumin Zhang 2
International Conference on Intelligent Systes Research an Mechatronics Engineering (ISRME 2015) Artifacts Reuction in Iage Renering of the Focuse Plenoptic Caera Peng Liu 1, Ruin Zhang 2 School of Electronic
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationFair Resource Allocation for Heterogeneous Tasks
Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105
More informationA CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER
A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University
More informationTest-Based Inference of Polynomial Loop-Bound Functions
Test-Base Inference of Polynomial Loop-Boun Functions Olha Shkaravska Roy Kersten Rabou University Nijmegen {shkarav,r.kersten}@cs.ru.nl Marko van Eekelen Rabou University Nijmegen an Open Universiteit
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More information6.1 Topological relations between two simple geometric objects
Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationNews Events Clustering Method Based on Staging Incremental Single-Pass Technique
News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2
More informationRecognition and Rejection Performance in Wordspotting Systems Using Support Vector Machines
Recognition an Rejection Perforance in Worspotting Systes Using Support Vector Machines Yassine Ben Aye, Doinique Fohr, Jean Paul Haton, Gérar Chollet ENST, CNRS-LTCI, 46 rue Barrault, F75634 Paris ceex
More informationEffective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion
Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir
More informationSymbolic Loop Bound Computation for WCET Analysis
Symbolic Loop Bound Computation for WCET Analysis Jens Knoop, Laura Kovács, and Jakob Zwirchmayr Vienna University of Technology Abstract. We present an automatic method for computing tight upper bounds
More informationAutomatic Graph Drawing Algorithms
Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs
More informationScope-aware Data Cache Analysis for WCET Estimation
Scope-aware Data Cache Analysis for WCET Estiation Bach Khoa Huynh National University of Singapore huynhbac@cop.nus.edu.sg Lei Ju Shandong University julei@sdu.edu.cn (Corresponding author) Abhik Roychoudhury
More informationAbstract Matrix Arithmetic
Abstract Matrix Arithetic Alan P Sexton and Volker Sorge School of Coputer Science University of Biringha wwwcsbhaacuk/ aps vxs Stephen M Watt Coputer Science Departent University of Western Ontario wwwcsduwoca/
More informationUsing Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses
International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationConstruction of a regular hendecagon by two-fold origami
J. C. LUCERO /207 Construction of a regular hendecagon by two-fold origai Jorge C. Lucero 1 Introduction Single-fold origai refers to geoetric constructions on a sheet of paper by perforing a sequence
More informationL Destructive interference:
SPH3UW/SPH4UI Unit 9.3 Interference of Light in Two Diensions Page 1 of 11 Notes Physics Tool box A pair of ientical point sources operating in phase prouces a syetrical pattern of constructive an estructive
More informationTheoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem
Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The
More informationOptimal Route Queries with Arbitrary Order Constraints
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationStructural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.
Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable
More informationAn Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks
An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San
More informationA Novel 2D Texture Classifier For Gray Level Images
2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan
More informationHIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES
HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co
More informationPolynomial-Time Isomorphism of 1-L-Complete Sets
journal of coputer and syste sciences 53, 155160 (1996) article no. 0057 Polynoial-Tie Isoorphis of 1-L-Coplete Sets anindra Agrawal* and Soenath Biswas - epartent of Coputer Science and Engineering, Indian
More informationDistributed Multi-robot Work Load Partition In Manufacturing Automation
th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua
More informationRelief shape inheritance and graphical editor for the landscape design
Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru
More informationAN APPROACH ON BIMODAL BIOMETRIC SYSTEMS
AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More informationλ-harmonious Graph Colouring Lauren DeDieu
λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationKS3 Maths Progress Delta 2-year Scheme of Work
KS3 Maths Progress Delta 2-year Schee of Work See the spreadsheet for the detail. Essentially this is an express route through our higher-ability KS3 Maths Progress student books Delta 1, 2 and 3 as follows:
More informationScienceDirect. Force-Torque Control Implementation for 2 DoF Manipulator
Available online at www.scienceirect.co ScienceDirect Proceia Engineering 69 ( 2014 ) 1232 1241 24th DAAAM International Syposiu on Intelligent Manufacturing an Autoation, 2013 Force-Torque Control Ipleentation
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationKnowledge Discovery Applied to Agriculture Economy Planning
Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn
More informationWeeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10
Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationA GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS
A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationDesign and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design
Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationcm3520 cm3525 Security Function
wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationMULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou
MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi
More informationFeature Selection to Relate Words and Images
The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationA Measurement-Based Model for Parallel Real-Time Tasks
A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington
More informationKeyword Search in Spatial Databases: Towards Searching by Document
IEEE International Conference on Data Engineering Keyword Search in Spatial Databases: Towards Searching by Docuent Dongxiang Zhang #1, Yeow Meng Chee 2, Anirban Mondal 3, Anthony K. H. Tung #4, Masaru
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationIN many interactive multimedia streaming applications, such
840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior
More informationGalois Homomorphic Fractal Approach for the Recognition of Emotion
Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationDeterministic Voting in Distributed Systems Using Error-Correcting Codes
IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract
More informationImplementation of fast motion estimation algorithms and comparison with full search method in H.264
IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar
More informationExample: Computer, SRC Simple RISC Computer
2-24 Chapter 2 Machines, Machine Languages, and Digital Logic Exaple: Coputer, SRC Siple RISC Coputer 32 general purpose registers of 32 bits 32-bit progra counter, PC, and instruction register, IR 2 32
More informationDepth Estimation of 2-D Magnetic Anomalous Sources by Using Euler Deconvolution Method
Aerican Journal of Applied Sciences 1 (3): 209-214, 2004 ISSN 1546-9239 Science Publications, 2004 Depth Estiation of 2-D Magnetic Anoalous Sources by Using Euler Deconvolution Method 1,3 M.G. El Dawi,
More informationA New Generic Model for Vision Based Tracking in Robotics Systems
A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University
More informationImage hiding with an improved genetic algorithm and an optimal pixel adjustment process
Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping
More information