ABC: Analyzing Loop Bounds and Complexities

Size: px
Start display at page:

Download "ABC: Analyzing Loop Bounds and Complexities"

Transcription

1 ABC: Analyzing Loop Bouns an Coplexities Régis Blanc, Thoas A. Henzinger, Thibau Hottelier, an Laura Kovács EPFL, Switzerlan Abstract. We present ABC, a software tool for autoatically coputing sybolic upper bouns on the nuber of iterations of progra loops. The syste cobines static analysis of progras with sybolic suation techniques to erive loop invariant relations aong progra variables. Iteration bouns are obtaine fro the inferre invariants, by substituting variables with their greatest values. We have successfully applie ABC to a large nuber of exaples. The erive sybolic bouns express non-trivial polynoial relations over loop variables. We also report on results to autoatically infer sybolic expressions over haronic nubers as upper bouns on loop iteration counts. 1 Introuction Establishing tight upper bouns on the execution ties of progras is both ifficult an interesting, see e.g. [6,, 5, 1]. We present ABC, a new software tool for autoatically coputing tight sybolic upper bouns on the nuber of iterations of progra loops. The erive bouns express polynoial relations over loop variables. ABC is fully autoatic, cobines static analysis of progras with sybolic suation techniques, an requires no user-guiance in proviing aitional set of preicates, teplates an assertions. ABC is also able to erive sybolic expressions over haronic nubers as upper bouns on loop iteration counts, which, to the best of our knowlege, is not yet possible by other works. In our approach to boun coputation, we have ientifie a special class of neste loop progras, calle the ABC-loops (Section 3.1). Further, we have built a loop converter to transfor, whenever possible, arbitrary loops into their equivalent ABC-loop forat (Section 3.). Inforally, an ABC-loop is a neste for-loop such that each loop fro the neste loop contains exactly one iteration variable with only one conition an (non-initializing) upate on the iteration variable. For such loops, our etho erives exact bouns on the nuber of loop iterations. We assue that each progra stateent is annotate with the tie units it nees to be execute. For siplicity, we assue that an iteration of an unneste loop takes one unit tie, an all other instructions of the unneste loop nee zero tie. The key steps of our approach to boun coputation are as follows (Section 3.3). (i) First, we instruent the innerost loop boy of an ABC-loop with a new variable that increases at every iteration of the progra. We enote this variable by z. Upper bouns on the value of z thus express upper bouns on the nuber of loop iterations. (ii) Next, the value of z is copute as a polynoial function over the neste loop s iteration variables. We call the relation between z an loop s iteration variables the z-relation. To this en, for each loop of the ABC-loop recurrence equations of z an loop iteration variables are first constructe. Close fors of variables are then erive using our This research was supporte by the Swiss NSF.

2 Loop Sybolic Sus Sybolic Solver Close Fors Loop Converter ABC Loop Boun Coputer z-relation Fig. 1. The ABC tool. sybolic solver which integrates special techniques fro sybolic suation (Section 3.4). The erive close fors express vali relations aong z an loop iteration variables, an thus the z-relations are loop invariant properties. (iii) Further, by substituting loop iteration variables by their greatest values in the copute z-relation, bouns on the value of z are obtaine. These bouns give us tight sybolic upper bouns on the nuber of iterations of the progra. Our etho can be generalize for the tiing analysis of loops whose iteration bouns involve haronic expressions over the loop variables (Section 3.5). Ipleentation. ABC was ipleente in the the Scala prograing language [11], contains altogether 5437 lines of Scala coe, an is available at Inputs to ABC are loops written in the Scala syntax. ABC first rewrites the input loop into an equivalent ABC-loop by using its loop converter, an then coputes bouns on loop iteration counts using its boun coputer. The boun coputer relies on the sybolic solver in orer to erive close fors of sybolic sus an siplify atheatical expressions. The overall workflow of ABC is given in Figure 1. Note that we o not rely on external coputer algebra package for sybolic suation. Experients. We successfully applie ABC on exaples fro [6, 5], as well as on ninety loops extracte fro the JAMA package [8] see the appenix an entione URL. Altogether, we ran ABC on 558 lines of JAMA. ABC copute exact upper bouns on iteration counts for all loops, an inferre the z-relation for eighty-seven loops, all in less than one secon on a achine with a.8 GHz Intel Core Duo processor an GB of RAM. The three loops for which ABC was not able to erive the z-relation were actually sequences of loops. Relate Work. We only present soe of the nuerous ethos that are relate to ABC. Paper [9] infers polynoial loop invariants aong progra variables by using polynoial invariant teplates of boune egree. Unlike [9] where no restrictions on the consiere loops were ae, we require no user guiance in proviing invariant teplates but autoatically erive invariants (z-relations) for a restricte class of loops. The approach presente in [7] infers invariants an boun assertions for loops with neste conitionals, by eploying sybolic coputations techniques. Neste loops cannot be hanle in [7]. In contrast, we infer boun assertions as z-relations for neste loops, but, unlike [7], our assertions are only over loop iteration variables an not arbitrary progra variables. Paper [6] erives iteration bouns of neste loops by pattern atching siple recurrence equations. Contrarily to [6], we solve ore general recurrence equations using the Gosper algorith an ientities over haronic nubers.

3 for (i = 1; i n; i = i + 1) o for (j = 1; j n; j = j + 1) o (a) for (i = 0; i n; i = i + 1) o for (j = 0; j ; j = j + ) o (b) Fig.. Exaples illustrating the power of ABC to (i) copute z-relations as loop invariants, an (ii) infer tight upper bouns on the nuber of iterations of loops. Sybolic upper bouns on iteration counts of ulti-path loops are autoatically erive in [1]. The approach eploys control-flow refineent ethos to eliinate infeasible loop paths an rewrite ulti-path loops into a collection of sipler loops for which boun assertions are inferre using abstract interpretation techniques [1]. The progras hanle by [1] are ore general than the ABC-loops. Unlike [1], we o not rely on abstract interpretation, an are able to infer haronic expressions as upper bouns on loop iterations counts. There has been a great eal of research on estiating the worst case execution tie (WCET) of real-tie systes, see e.g. [, 5]. The cite works autoatically infer loop bouns only for siple loops; bouns for the iteration nubers of ulti-path loops ust be provie as user annotations. The ait tool [] eterines the nuber of loop iterations by relying on a cobination of interval-base abstract interpretation with pattern atching on typical loop patterns. The SWEET tool [5] eterines upper bouns on loop iterations by unrolling loops ynaically an analyzing each loop iteration separately using abstract interpretation. In contrast, our etho is fully autoatic an path-insensitive, but it is restricte to ABC-loops. Motivating Exaples We first give soe exaples illustrating what kin of iteration bouns ABC can autoatically generate. Consier Figure (a) taken fro the JAMA library [8]. ABC first instruents the innerost loop of Figure (a) with a new variable z, initialize to 1, for counting the nuber of iterations of Figure (a). The such obtaine loop is presente in Figure 3(a). Further, by applying ABC on Figure 3(a), we erive the z-relation 1 z = (i 1)n + j as an invariant property of the loop. By substituting i an j with their greatest values (i.e. n) in the z-relation, the nuber of iterations of Figure (a) is boune by n. Consier next Figure (b) with a non-unit increent, an its instruente version in Figure 3(b). We obtain the z-relation: z = 1 + ( j + i ) + 1, yieling: 1 + (1 + n) + n as a tight upper boun on loop iteration counts, where enotes the largest integer not greater than. In the sequel, we illustrate the ain steps of ABC on Figure (b). 1 Actually, the loops of Figure are first translate into their equivalent ABC-forat, an then the z variable is introuce in their innerost loop boy. For siplicity, in Figure 3 we present the instruentation step irectly on the loops of Figure an not on their ABC-loop forats. In our work we i not consier analyzing the relations between the sallest an greatest sybolic values of the loop iteration variables. It ay be however the case that these sybolic values are such that the loops are never execute (e.g. n < 0).

4 z = 1 for (i = 1; i n; i = i + 1) o for (j = 1; j n; j = j + 1) o z = z + 1 (a) z = 1 for (i = 0; i n; i = i + 1) o for (j = 0; j ; j = j + ) o z = z + 1 (b) 3 ABC: Syste Description Fig. 3. Figure instruente by ABC We have ientifie a special class of loops, calle the ABC-loops (Section 3.1), an esigne a loop converter for translating progras into their equivalent ABC-loop shape (Section 3.). Algorithic ethos fro sybolic suation, ipleente in our sybolic solver (Section 3.4), are further eploye in ABC to autoatically erive upper bouns on loop iterations of ABC-loops (Section 3.3). 3.1 ABC-Loops We enote by Z the set of integer nubers, an by Z[x] the ring of polynoial functions in ineterinate x over Z. We consier progras of the following for: for (i 1 = 1; i 1 c; i 1 = i 1 + 1) o for (i = 1; i f 1(i 1); i = i + 1) o for (i = 1; i f 1 (i 1,, i 1 ); i = i + 1) o (1) where i 1,, i are pairwise isjoint scalar variables (calle loop iteration variables) with values fro Z, c is an integer-value sybolic constants, an f k Z[i 1,, i k ] are polynoial functions (k = 1,, 1). In what follows, loops satisfying (1) will be calle ABC-loops. 3. The Loop Converter Converting loops into ABC-loops is one as presente in Algorith 1. The algorith (i) converts loops into equivalent ones such that the sallest values of the loop iteration variables are 1, an (ii) converts loops with arbitrary increents over the iteration variables into equivalent loops with increents of 1. In ore etail, Algorith 1 takes as input a neste for-loop F an an epty list conversion list, an returns, whenever possible, an ABC-loop F that is equivalent to F. The conversion list is use to store the list of changes ae by Algorith 1 on the iteration variables of F. Lines 4-9 of Algorith 1 are require to convert F into an equivalent loop whose outerost loop has the following properties: it iterates over a new variable nvar instea of the iteration variable ovar of the outerost loop of F, where nvar an ovar are polynoially relate; the sallest value of nvar is 1 (instea of the sallest value olboun of ovar); nvar is increent by 1 (instea of the oincr increent value of ovar); the greatest value of nvar is given by the largest integer not greater than the rational expression ouboun olboun oincr + 1, where ouboun is the

5 Algorith 1 Loop Converter Input: For-loop F an conversion list = {} Output: ABC-loop F an conversion list 1: ovar, oincr := outer iteration variable(f ), outer iteration increent(f ) : olboun, ouboun := outer iteration lowerboun(f ),outer iteration upperboun(f ) 3: nvar:= fresh variable() 4: F 0:= loop boy(f ) /. (ovar oincr (nvar + olboun 1 ) ) 5: conversion list:=conversion list {ovar = oincr (nvar + olboun 1 ) } 6: if isloop(f 0) then 7: F := for-loop(nvar, 1, ouboun olboun oincr + 1, 1, Loop Converter(F0)) 8: else 9: F := for-loop(nvar, 1, ouboun olboun oincr + 1, 1, F0) 10: en if greatest value of ovar. The (appropriately oifie 3 ) loop boy F 0 of F is processe in the siilar anner, yieling finally the ABC-loop F that is equivalent to F. The for loop(v, e 1, e, e 3, boy) notation is a short-han notation for the loop for (v = e 1 ; var e ; var = var + e 3 ) o boy. Exaple 1 Consier Figure (b). By applying Algorith 1, the loop iteration variables i 1 an j 1 are introuce with i = i 1 1 an j = (j 1 1) (lines 3-5 of Algorith 1). The sallest values of i 1 an j 1 are 1, their greatest values are respectively n + 1 an + 1, an i 1 an j 1 are increente by 1 (lines 6-9 of Algorith 1). The ABC-loop forat of Figure (b) is given in Figure 4(a). Base on Algorith 1 an keeping the notations of (1), we conclue that the general shape of loops that can be converte into ABC-loops is: for (i 1 = l; i 1 c; i 1 = i 1 + inc 1) o for (i = g 1(i 1); i f 1(i 1); i = i + inc ) o for (i = g 1 (i 1,, i 1 ); i f 1 (i 1,, i 1 ); i = i + inc ) o where l, inc 1,, inc are integer-value sybolic constants, an g k Z[i 1,, i k ]. 3.3 The Boun Coputer We assue that each progra stateent is annotate with the tie units it nees to be execute. For siplicity, we assue that an iteration of an unneste ABC-loop takes one unit tie, an all other instructions of the unneste loop nee zero tie (e.g. assignent stateents take zero tie to be execute). That is we copute a boun on the total nuber of loop iterations of an ABC-loop (1). 3 The expression e 1/.x e is obtaine fro e 1 by substituting each occurrence of the variable x by the expression e. ()

6 for (i 1 = 1; i 1 n + 1; i 1 = i 1 + 1) o for(j 1 = 1; j 1 + 1; j1 = j1 + 1) o (a) z = 1 for (i 1 = 1; i 1 n + 1; i 1 = i 1 + 1) o for(j 1 = 1; j 1 + 1; j1 = j1 + 1) o z := z + 1 (b) Fig. 4. ABC-loop forat of Figure(b) an its instruente version, where i = i 1 1 an j = (j 1 1). Note that / Z., In our approach to boun coputation, we instruent the innerost loop boy of (1) with a new variable that increases at every iteration of the progra, an is initialize to 1 before entering the ABC-loop. We enote this variable by z. We hence obtain: for (i 1 = 1; i 1 c; i 1 = i 1 + 1) o for (i = 1; i f 1 (i 1,, i 1 ); i = i + 1) o z := z + 1 (3) Exaple The instruente loop of Figure 4(a) is given in Figure 4(b). Upper bouns on the value of z give upper bouns on the nuber of iterations of (3). We are hence left with coputing the value of z as a function, calle the z-relation, over i 1,, i. To this en, the value of z at an arbitrary iteration of the outerost loop of (3) is first copute. Coputing the value of z after an arbitrary iteration of the outerost loop of (3). Let us consier a ore general loop than (3): for (i 1 = 1; i 1 c; i 1 = i 1 + 1) o for (i = 1; i f 1(i 1); i = i + 1) o for (i = 1; i f 1 (i 1,, i 1 ); i = i + 1) o z := z + g(i ) (4) where i 1,, i, c, f 1,, f 1 are as in (1), an g Z[i ]. In particular, if g = 1 then (4) becoes (3). Let s 1,, s l be nonnegative integers (l = 1,, ) such that 1 s 1 c, 1 s f ( i 1 ),, an 1 s l f l 1 (i 1,, i l 1 ). In the sequel we consier s 1,, s l arbitrary but fixe. We write x (l, s1,...,sl ) to ean the value of a variable x {i 1,, i, z} in (4) such that the kth loop of (4) is at its s k th iteration (k = 1,, l), We are thus intereste in eriving z (1, s1 ) for s 1 {1,, c}. We procee as follows. For each loop of (4), starting fro the innerost one, we (i) oel the assignent over z as a recurrence equation, (ii) eploy sybolic suation algoriths to copute the close for of z, an (iii) replace the loop by a single assignent over z expressing

7 the relation between the values of z before the first an after the last execution of the loop. Steps (i)-(iii) are recursively applie until all loops of (4) are eliinate. In ore etail, z (1, s1 ) is erive as follows. We start with the innerost loop of (4). The assignent over z is oele by the recurrence equation: z (, s1,...,s +1 ) = z (, s1,...,s ) + g(i (, s1,...,s 1 ) ), (5) yieling z (, s1,...,s ) = ini z + s g(i(, s1,...,k 1 ) ), where ini z = z (, s1,...,0 ) enotes the value of z before entering the innerost loop of (4). The value of i (, s1,...,s ) is copute fro the recurrence equation i (, s1,...,s +1 ) = i (, s1,...,s ) +1. Naely, we have i (, s1,...,s ) = ini + s 1, where ini = 1 enotes the initial value of i (i.e. before the first iteration of the innerost loop of (4)). Hence, i (, s1,...,s ) = s + 1. (6) Note that (6) hols for each iteration variable, that is i (l, s1,...,s l ) l = s l + 1 for every l {1,, }. For this reason, in what follows we write i l instea of i (l, s1,...,s l ) l an use the relation i l = s l + 1 to speak about the value of i l at iteration s l of the lth loop. We thus obtain z (, s1,...,s ) = ini z + s g(i(, s1,...,k 1 ) ) = ini z + i 1 g(k) Since g Z[i ], the close for of i 1 g(k) always exists [3] an can be copute as a polynoial function over i (see Section 3.4). Finally, we consier the last iteration s = i 1 = f 1 (i 1,, i 1 ) of the innerost loop of (4), an write incr = f 1 (i 1,...,i 1 ) g(k). We ake use of incr Z[i 1,, i 1 ] to eliinate the innerost loop of (4) an obtain: for (i 1 = 1; i 1 c; i 1 = i 1 + 1) o for (i 1 = 1; i 1 f 1 (i 1,, i ); i 1 = i 1 + 1) o z := z + incr Inner loops of (7) can be further eliinate by applying recursively the steps escribe above, since close fors of polynoial expressions over i 1,, i yiel polynoial expressions over i 1,, i whenever the suation variables are boune by polynoial expressions. As a result, the total nuber of increents over z in the s 1 th iteration of the outerost loop of (4) is erive. Let us enote this nuber by incr 1. Then: z (1, s1 ) = z 0 + incr 1, where z 0 = 1 is the value of z before (4). Exaple 3 Consier Figure 4(b). We ai at eriving z (1, s1 ), where 1 s 1 n+1 is arbitrary but fixe such that i 1 = s Fro the innerost loop of Figure 4(b) we get z (, s1,s+1 ) = z (, s1,s ) + 1 for an arbitrary but fixe s, where 1 s + 1 an j 1 = s + 1. Hence, z (, s1,s ) = ini + j 1 1, where ini is the initial value of z before entering the innerost loop. Further, after s = j 1 1 = + 1 iterations of the innerost loop, the total nuber of increents over z is incr = +1 1 = + 1. The innerost loop of Figure 4(b) is next eliinate, yieling: (7)

8 Algorith Boun Coputer Input: ABC-loop F, initial value z 0 of z Output: z-relation zrel 1: inner:= loop boy(f ) : incr:= z reuce loop(inner) 3: ovar, ouboun := outer iteration variable(f ),outer iteration upperboun(f ) 4: nvar:= fresh variable() 5: z i:=z 0 + solve su(nvar, 1, ovar 1, incr/.(ovar nvar)) 6: if isloop(inner) then 7: zrel:= z =Boun Coputer(inner, z i) 8: else 9: zrel:=z = z i 10: en if for (i 1 = 1; i 1 n + 1; i 1 = i 1 + 1) o z = z with the recurrence equation of z as z (1, s1 +1) = z (1, s1 ) Solving this recurrence an using that z 0 = 1 is the initial value of z before the outerost loop of Figure 4(b), we obtain: z (1, s1 ) = 1 + i 1 1 ( + 1) = 1 + (i 1 1) ( + 1). Coputing the z-relation aong arbitrary values of z, i 1,, i. We are intereste in eriving the value of z (, s1,...,s ), where i k = s k + 1 (k = 1,, ), fro which the z-relation can be ieiately constructe as z = z (, s1,...,s ). The value z (, s1,...,s ) (an hence the z-relation) is inferre by Algorith as follows. (a) The value incr is copute s.t. z (1, s1 ) = z 0 + incr (line of Algorith ); (b) The outerost loop of (4) is oitte (line 1 of Algorith ), yieling: for (i = 1; i f 1(i 1); i = i + 1) o for (i = 1; i f 1 (i 1,, i 1 ); i = i + 1) o z := z + g(i ) (c) The value of z at the s n iteration of the outerost loop (8) is next copute, where the initial value of z before (8) is consiere to be z (1, s1 ) (line 7 of Algorith ). As a result, z (, s1,s ) in the loop (4) is obtaine. () Steps (b)-(c) are recursively applie on (8) (lines 6-9 of Algorith ). Exaple 4 Consier Figure 4(b). The outerost loop of Figure 4(b) is oitte (line 1 of Algorith ), yieling: for(j 1 = 1; j 1 + 1; j 1 = j 1 + 1) o z = z + 1 (9) The total nuber of increents incr = + 1 over z ae by (9) is copute, as presente in Exaple 3 (line of Algorith ). The value z i = z (1, s1 ) of z at an iteration s 1 = i 1 1 of the outerost loop of Figure 4(b) is further copute as z i = z 0 + i 1 1 ( nvar=1 + 1) = 1 + (i 1 1) ( + 1) (lines 3-5 of Algorith ). (8)

9 for (i = 1; i n; i = i + 1) for (j = 0; j n; j = j + i) for(i 1 = 1; i 1 n; i 1 = i 1 + 1) for(j 1 = 1; j 1 n 1; j 1 = j 1 + 1) z := z + 1 for(i 1 = 1; i 1 n; i 1 = i 1 + 1) for(j 1 = 1; j 1 n 1; j 1 = j 1 + 1) z := z + 1 (a) Not an ABC-loop (b) Converte loop by ABC with (c) Instruente loop by ABC n 1 = n i + 1, an i = i 1 1, j = i j 1 Fig. 5. ABC on a non-abc-loop. Next, Algorith is calle on (9) with the initial value z i to copute the value of z at an iteration s = j 1 1 of (9) (line 7 of Algorith ). As (9) has no inner loops, we have incr = 1 an z i = z i + j 1 1 nvar=1 1, yieling z(, s1,s ) = z i = (i 1 1) ( + 1) + j 1 (lines -5 of Algorith ). The z-relation of Figure 4(b) is finally erive as z = (i 1 1) ( + 1) + j 1 (line 9 of Algorith ). To obtain the z-relation of Figure (b), we ake use of i = i 1 1 an j = (j 1 1) an have: z = i ( ) j + 1. Substituting i an j with n an in the z- relation, the upper boun on loop iteration counts of Figure (b) is: (n + 1) ( ) Sybolic Solver Siplifying arithetical expressions an coputing close fors of sybolic sus is perfore by the sybolic solver engine of ABC. Our sybolic solver supports the close for coputation of the following sus: e x=e 1 c 1 n x 1 x c r n x r x r where e 1, e are integer-value sybolic constants, n i, i are natural nubers, an c i are rational nubers. Close fors of such sus always exists [3]. For coputing the close fors of these sus we rely on a siplifie version of the Gosper algorith [3]. We have also instruente our sybolic solver to hanle sybolic sus whose close fors involve haronic nubers [4], as iscusse in Section Beyon ABC-Loops ABC is coplete for ABC-loops an for loops satisfying (). That is, it always returns the z-relation an loop iteration boun of an ABC-loop. It is worth to be entione that soe loops violating () can still be successfully analyze by ABC. Consier Figure 5(a) violating (), as upates over j epen on i. However, using Algorith 1 we erive the loop given in Figure 5(b), yieling finally the instruente loop fro Figure 5(c). Further, by applying Algorith, we are left n i 1. This su cannot be further siplifie [4]. with fining the close for of i 1 1 However, we can copute an upper-boun on its close for using the relation: i 1 1 n i 1 i1 1 i 1 n = n i 1 1 i 1 1. Note that i i 1 is the haronic nuber H(i 1 1) arising fro the truncation of the haronic series [4]. We ake use of H(i 1 1) an erive an upper boun on the

10 loop iteration count of Figure 5(a) as being a haronic expression. To this en, we have extene our sybolic solver with soe siple ientities over haronic nubers. ABC can be thus successfully applie to loops for which sybolic coputation ethos can be eploye to copute or approxiate close fors of loop variables. 4 Conclusions We escribe the software tool ABC for autoatically eriving tight sybolic upper bouns on loop iteration counts of a special class of loops, calle the ABC-loops. The syste was successfully trie on a large nuber of exaples. The erive sybolic bouns express non-trivial (polynoial an haronic) relations over loop variables. Future work inclues extening ABC to hanle ore coplex sus, such as e.g. fractions of polynoials [10], an incluing ore sophisticate control-flow refineent techniques, such as [1], into ABC. References 1. P. Cousot an R. Cousot. Abstract Interpretation: a Unifie Lattice Moel for Static Analysis of Progras by Construction or Approxiation of Fixpoints. In Proc. of POPL, pages 38 5, C. Ferinan an R. Heckann. ait: Worst Case Execution Tie Preiction by Static Progra Analysis. In IFIP Congress Topical Sessions, pages , R. W. Gosper. Decision Proceures for Inefinite Hypergeoetric Suation. Journal of Sybolic Coputation, 75:40 4, R. L. Graha, D. E. Knuth, an O. Patashnik. Concrete Matheatics. Aison-Wesley Publishing Copany, n eition, J. Gustafsson, A. Ereahl, C. Sanberg, an B. Lisper. Autoatic Derivation of Loop Bouns an Infeasible Paths for WCET Analysis Using Abstract Execution. In RTSS, pages 57 66, C. A. Healy, M. Sjöin, V. Rustagi, D. B. Whalley, an R. van Engelen. Supporting Tiing Analysis by Autoatic Bouning of Loop Iterations. Real-Tie Systes, 18(/3):19 156, T. A. Henzinger, T. Hottelier, an L. Kovacs. Valigator: A Verification Tool with Boun an Invariant Generation. In Proc. of LPAR, pages , J. Hicklin, C. Moler, P. Webb, R. F. Boisvert, B. Miller, R. Pozo, an K. Reington. JAMA: A Java Matrix Package M. Müller-Ol, M. Petter, an H. Seil. Interproceurally Analyzing Polynoial Ientities. In Proc. of STACS 006, I. Nees an M. Petkovsek. RCop: A Matheatica Package for Coputing with Recursive Sequences. Journal of Sybolic Coputation, 0(5-6): , M. Oersky. The Scala Language Specification S. Srivastava an S. Gulwani. Progra Verification using Teplates over Preicate Abstraction. In Proc. of PLDI, pages 3 34, R. A. van Engelen, J. Birch, an K. A. Gallivan. Array Data Depenence Testing with the Chains of Recurrences Algebra. In Proc. of IWIA, pages 70 81, 004.

11 Appenix: Experiental Results with ABC Loop z-relation Iteration boun Tie [s] for(i = a; i b; i = i + 1) for(i = 0; i n 1; i = i + 1) for(j = 0; j i; j = j + 1) for(i = 1; i ; i = i + 1) for(j = 1; j i; j = j + 1) for(k = i + 1; k ; k = k + 1) for(l = 1; l k; l = l + 1) for(i = 0; i ( n n n 1); i = i + 1) for(j = 0; j n 1; j = j + 1) for(k = 0; k j 1; k = k + 1) for(i = 1; i n; i = i + 1) for(j = 1; j i; j = j + 1) for(i = 1; i n; i = i + 1) for(j = i; j n; j = j + 1) for(i = a; i b; i = i + 1) for(j = c; j ; j = j + 1) for(k = i j; k i + j; k = k + 1) for(i = n; i 1; i = i 1) for(j = ; j 1; i = j 1) z = 1 + i a 1 + b a z = 1 + j + i+i z = i i +i i 4 + i i i3 i 1 + j+j +k +ji +ji++k + 1 z = 1 + k + in in+j j z = i i + j z = (i 1)n + j + i i z = 1 a + i a + i + ac ic + j c + j a + k n+n n 4 n 4 n +n n +n 1 + b a c + bc +ac +b a + b a z = (n i+1) j+1 n 3 Table 1. ABC results obtaine on a achine with a.8 GHz Intel Core Duo processor an GB of RAM. The first four progras of Table 1 are exaples taken fro [13], whereas the last four progras of Table 1 are loops taken fro the JAMA package [8]. The first colun of Table 1 presents the loop being fe into ABC, the secon colun shows the z-relation erive by ABC, whereas the thir one presents the nuber of loop iterations copute by ABC. The forth colun gives the tie neee by ABC to infer bouns on loop iteration counts. Note that iteration bouns are integer-value polynoial expressions (e.g. n + n is ivisible by )

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

arxiv: v1 [math.co] 10 Aug 2016

arxiv: v1 [math.co] 10 Aug 2016 LOWER BOUNDS FOR ON-LINE INTERVAL COLORING WITH VECTOR AND CARDINALITY CONSTRAINTS GRZEGORZ GUTOWSKI AND PATRYK MIKOS arxiv:1608.03078v1 [ath.co] 10 Aug 2016 Abstract. We propose two strategies for Presenter

More information

r-tubound: Loop Bounds for WCET Analysis (tool paper)

r-tubound: Loop Bounds for WCET Analysis (tool paper) r-tubound: Loop Bounds for WCET Analysis (tool paper) Jens Knoop, Laura Kovács, and Jakob Zwirchmayr TU Vienna Abstract. We describe the structure and the usage of a new software tool, called r-tubound,

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

AN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS

AN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS AN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS Caixia Wang, Peggy Agouris, Anthony Stefaniis Center for Earth Observing an Space Research Departent of Earth Systes an Geoinforation

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology ELEN 689-603: Project Progress eport Second Order Delay Coputation for C networks wi Non-Tree Topology ajeshwary Tayade 000 07 573 //003 PDF created wi pdffactory trial version www.pdffactory.co : Introduction

More information

Available online at Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012

Available online at   Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012 Available online at www.sciencedirect.co Procedia Coputer Science 9 (2012 ) 1363 1370 Abstract International Conference on Coputational Science, ICCS 2012 Reachability Analysis of Concurrent Boolean Progras

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Tree Interpolation in Vampire

Tree Interpolation in Vampire Tree Interpolation in Vampire Régis Blanc 1, Ashutosh Gupta 2, Laura Kovács 3, and Bernhard Kragl 4 1 EPFL 2 IST Austria 3 Chalmers 4 TU Vienna Abstract. We describe new extensions of the Vampire theorem

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Homework 1. An Introduction to Neural Networks

Homework 1. An Introduction to Neural Networks Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the

More information

WAVE OPTICS. Conceptual Questions Because ym

WAVE OPTICS. Conceptual Questions Because ym WAVE OPTICS Conceptual Questions.. The initial light pattern is a ouble-slit interference pattern. It is centere behin the ipoint of the slits. The slight ecrease in intensity going outwar fro the ile

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu Clais, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Artifacts Reduction in Image Rendering of the Focused Plenoptic Camera Peng Liu 1, Rumin Zhang 2

Artifacts Reduction in Image Rendering of the Focused Plenoptic Camera Peng Liu 1, Rumin Zhang 2 International Conference on Intelligent Systes Research an Mechatronics Engineering (ISRME 2015) Artifacts Reuction in Iage Renering of the Focuse Plenoptic Caera Peng Liu 1, Ruin Zhang 2 School of Electronic

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

Test-Based Inference of Polynomial Loop-Bound Functions

Test-Based Inference of Polynomial Loop-Bound Functions Test-Base Inference of Polynomial Loop-Boun Functions Olha Shkaravska Roy Kersten Rabou University Nijmegen {shkarav,r.kersten}@cs.ru.nl Marko van Eekelen Rabou University Nijmegen an Open Universiteit

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Recognition and Rejection Performance in Wordspotting Systems Using Support Vector Machines

Recognition and Rejection Performance in Wordspotting Systems Using Support Vector Machines Recognition an Rejection Perforance in Worspotting Systes Using Support Vector Machines Yassine Ben Aye, Doinique Fohr, Jean Paul Haton, Gérar Chollet ENST, CNRS-LTCI, 46 rue Barrault, F75634 Paris ceex

More information

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir

More information

Symbolic Loop Bound Computation for WCET Analysis

Symbolic Loop Bound Computation for WCET Analysis Symbolic Loop Bound Computation for WCET Analysis Jens Knoop, Laura Kovács, and Jakob Zwirchmayr Vienna University of Technology Abstract. We present an automatic method for computing tight upper bounds

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Scope-aware Data Cache Analysis for WCET Estimation

Scope-aware Data Cache Analysis for WCET Estimation Scope-aware Data Cache Analysis for WCET Estiation Bach Khoa Huynh National University of Singapore huynhbac@cop.nus.edu.sg Lei Ju Shandong University julei@sdu.edu.cn (Corresponding author) Abhik Roychoudhury

More information

Abstract Matrix Arithmetic

Abstract Matrix Arithmetic Abstract Matrix Arithetic Alan P Sexton and Volker Sorge School of Coputer Science University of Biringha wwwcsbhaacuk/ aps vxs Stephen M Watt Coputer Science Departent University of Western Ontario wwwcsduwoca/

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Construction of a regular hendecagon by two-fold origami

Construction of a regular hendecagon by two-fold origami J. C. LUCERO /207 Construction of a regular hendecagon by two-fold origai Jorge C. Lucero 1 Introduction Single-fold origai refers to geoetric constructions on a sheet of paper by perforing a sequence

More information

L Destructive interference:

L Destructive interference: SPH3UW/SPH4UI Unit 9.3 Interference of Light in Two Diensions Page 1 of 11 Notes Physics Tool box A pair of ientical point sources operating in phase prouces a syetrical pattern of constructive an estructive

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co

More information

Polynomial-Time Isomorphism of 1-L-Complete Sets

Polynomial-Time Isomorphism of 1-L-Complete Sets journal of coputer and syste sciences 53, 155160 (1996) article no. 0057 Polynoial-Tie Isoorphis of 1-L-Coplete Sets anindra Agrawal* and Soenath Biswas - epartent of Coputer Science and Engineering, Indian

More information

Distributed Multi-robot Work Load Partition In Manufacturing Automation

Distributed Multi-robot Work Load Partition In Manufacturing Automation th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

KS3 Maths Progress Delta 2-year Scheme of Work

KS3 Maths Progress Delta 2-year Scheme of Work KS3 Maths Progress Delta 2-year Schee of Work See the spreadsheet for the detail. Essentially this is an express route through our higher-ability KS3 Maths Progress student books Delta 1, 2 and 3 as follows:

More information

ScienceDirect. Force-Torque Control Implementation for 2 DoF Manipulator

ScienceDirect. Force-Torque Control Implementation for 2 DoF Manipulator Available online at www.scienceirect.co ScienceDirect Proceia Engineering 69 ( 2014 ) 1232 1241 24th DAAAM International Syposiu on Intelligent Manufacturing an Autoation, 2013 Force-Torque Control Ipleentation

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

cm3520 cm3525 Security Function

cm3520 cm3525 Security Function wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Keyword Search in Spatial Databases: Towards Searching by Document

Keyword Search in Spatial Databases: Towards Searching by Document IEEE International Conference on Data Engineering Keyword Search in Spatial Databases: Towards Searching by Docuent Dongxiang Zhang #1, Yeow Meng Chee 2, Anirban Mondal 3, Anthony K. H. Tung #4, Masaru

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Galois Homomorphic Fractal Approach for the Recognition of Emotion

Galois Homomorphic Fractal Approach for the Recognition of Emotion Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

Example: Computer, SRC Simple RISC Computer

Example: Computer, SRC Simple RISC Computer 2-24 Chapter 2 Machines, Machine Languages, and Digital Logic Exaple: Coputer, SRC Siple RISC Coputer 32 general purpose registers of 32 bits 32-bit progra counter, PC, and instruction register, IR 2 32

More information

Depth Estimation of 2-D Magnetic Anomalous Sources by Using Euler Deconvolution Method

Depth Estimation of 2-D Magnetic Anomalous Sources by Using Euler Deconvolution Method Aerican Journal of Applied Sciences 1 (3): 209-214, 2004 ISSN 1546-9239 Science Publications, 2004 Depth Estiation of 2-D Magnetic Anoalous Sources by Using Euler Deconvolution Method 1,3 M.G. El Dawi,

More information

A New Generic Model for Vision Based Tracking in Robotics Systems

A New Generic Model for Vision Based Tracking in Robotics Systems A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University

More information

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping

More information