Improving Performance of Sparse Matrix-Vector Multiplication

Size: px
Start display at page:

Download "Improving Performance of Sparse Matrix-Vector Multiplication"

Transcription

1 Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign Abstract Sparse matrix-vector multiplication (SpMxV) is one of the most important computational kernels in scientific computing. It often suffers from poor cache utilization an extra loa operations because of memory inirections use to exploit sparsity. We propose alternative ata structures, along with reorering algorithms to increase effectiveness of these ata structures, to reuce the number of memory inirections. Toleo propose hanling the x blocks of a matrix separately, oing only one inirection for each block. We propose packing all contiguous nonzeros into a block to reuce the number of memory inirections further. This reuces memory inirections per block to one for the cost of an extra array in storage an a loop uring SpMxV. We also propose an algorithm to permute the nonzeros of the matrix into contiguous locations. We state this problem as the traveling salesperson problem an use associate heuristics. Experiments verify the effectiveness of our techniques. Introuction One of the most important computational kernels in scientific computing is multiplying a sparse matrix by a vector. Many algorithms use sparse matrix-vector multiplication (SpMxV) in their inner loop (iterative solvers for systems of linear equations being ust one example). The repeate execution of this operation potentially amortizes the cost of a preprocessing phase, which might lea to computational savings in subsequent executions. The importance of the SpMxV operation has mae this challenging problem the subect of numerous research efforts. Data structures use for sparse matrices usually have two components: (i) an array that stores all the floating-point entries of the matrix, (ii) arrays that store the sparsity structure of the matrix, i.e., pointers to the locations of the floating-point entries in the matrix. To exploit the sparsity of the matrix the use of pointers is unavoiable but often limits the memory system performance. One reason for this is that pointers usually lea to poor cache utilization, since they lack spatial locality. The number of cache misses for the right- an/or left-han-sie vectors can ramatically increase if the sparse matrix has an irregular sparsity structure. Another important factor is that memory inirections (pointers) require extra loa operations. In sparse matrix operations, the number of floating-point operations per loa operation is lower than that of ense matrix operations, limiting overall performance. Research supporte by the Center for Simulation of Avance Rockets, fune by the U.S. Department of Energy through the University of California uner subcontract number

2 * % We propose alternative ata structures, as well as reorering algorithms to increase the effectiveness of those ata structures, to reuce the number of memory inirections in SpMxV. Toleo [7] propose ientifying blocks of a matrix an writing the matrix as the sum of two matrices, the first of which contains all the blocks an the secon contains the remaining entries. Thus, the number of memory inirections is reuce to only one for each block. In an alternative scheme, we pack all the nonzeros in contiguous locations into a block to reuce further the number of memory inirections, because only one memory inirections is require for all the nonzeros in a block. However, we then nee to know how many nonzeros are in each block, which requires an extra array an an extra loop uring SpMxV. This work concentrates on the latter problem. We also propose reorering the matrices to increase the effectiveness of our ata structures. The obective of reorering is to permute the nonzeros of the matrix into contiguous locations, as much as possible, to enlarge the ense blocks. We can show that this problem is NP-Complete, an thus heuristics must be use for a practical solution. We propose a graph moel to reuce the problem to the well-stuie traveling salesperson problem, an thus we can use heuristics esigne for that problem. We verify experimentally the effectiveness of the propose ata structures an algorithms. Our new ata structures an reorering techniques prouce improvements of up to 33% an improvements of % on average. The remainer of this paper is organize as follows. Section iscusses the shortcomings of current sparse matrix ata structures an proposes new alternatives. Section 3 states a new matrix reorering algorithm to permute the nonzeros of the matrix into contiguous locations. Experimental results are presente in Section 4, an finally we conclue with Section 5. Sparse Matrix Data Structures The most wiely use sparse matrix storage scheme is Compresse Row Storage (CRS). As its name implies, this scheme stores the sparse matrix as a sequence of compresse rows. Three arrays are employe:, an. The nonzeros of the sparse matrix are compresse into an array! in a rowwise "#$ &% (' manner. The column inex of each nonzero entry is store in the array, i.e., is the column % (' )& inex of the nonzero entry store in!. Finally, Figure presents a SpMxV algorithm using compresse row storage. stores the inex of the first nonzero of each row. +* for to, o - % ('.*0/ % (' for - % '.* - % ('74! to )3% 54 '6 '8:9%< 5% '=' o Figure : SpMxV algorithm in compresse row storage

3 FFFFE 4 FFFFE FFFFE 9 Sparse matrix-vector multiplication (SpMxV) algorithms ten to suffer from poor memory performance. One reason for this is ineffective cache utilization. Temporal locality is limite to right- an left-han-sie )3 vectors an array. No temporal locality is present in arrays! "#$ an. In CRS, there is goo temporal locality in the left-han-sie vector -, but the access pattern for the right-han-sie vector can be quite irregular, causing excessive cache misses. Reorering the matrix to reuce cache misses was propose by Das. et al. [3], who suggeste reucing the banwith of the matrix. Temam an Jalby [6] analyze the number of cache misses as a function of the banwith for various cache parameters. urgess an iles [] experimente with various orering algorithms an foun that reorering the matrix improves performance compare with ranom orering, but they i not etect a notable sensitivity to the particular orering metho use. Toleo [7] stuie reorering, along with other techniques, an reporte that Reverse Cuthill-Mcee orering yiele slightly better performance, but the ifferences were not significant. Another problem with SpMxV is that the ratio of loa operations is higher than with ense matrix operations. One extra loa operation is require to fin the column inex of each nonzero entry for each multiply-a operation. The innermost statement in the algorithm in Figure requires three loa operations for two floating-point operations. This not only increases the total number of loa instructions, but also can cause the loa units to be a bottleneck, especially in recent architectures as iscusse in [7]. The following two sections present ata structures that can ecrease the number of memory inirections uring SpMxV operation.. Fixe-Size locking In this approach, the matrix is written as sum of several matrices, some of which contain the ense blocks of the matrix with a prespecifie size. For instance, given a matrix, we can ecompose it into two matrices?>$@ an ">A>, such that CC?>$@?>A>, where ">$@ contains the? D ense blocks of the matrix an?>a> contains the remainer. An example is illustrate in Figure. A simple greey algorithm is sufficient to 9 9 HJI III = HJI III + 9 =?>$@ + ">A> HJI III Figure : Fixe size blocking with? blocks? L MN extract the maximum number of blocks in a matrix, where. However, the problem is more ifficult for O blocks for OQP. Exploiting ense blocks can reuce the number of loa operations, as well as the total memory requirement, because only one inex per block is require. Moreover, the entry of the right-han-sie vector 9 can

4 FFFFFE be use multiple times as oppose to once in the conventional scheme after a loa operation. A similar problem has been stuie in the context of vector processors [], but those efforts concentrate on fining fewer blocks of larger size, whereas we are intereste in much smaller blocks.. locke Compresse Row Storage In this section we propose a new sparse matrix storage scheme esigne to reuce the number of loa operations. The iea of this scheme is to exploit the nonzeros in contiguous locations by packing them. Unlike fixe-size blocking, the blocks will have variable lengths. This enables longer nonzero strings to be packe into a block. As in fixe-size blocking, if we know the column inex of the first nonzero in a block, then we will also know the column inices of all its other nonzeros. In other wors, only one memory inirection (extra loa operation) is require for each block. 3 This storage scheme requires an array RTS (of length the number of blocks) in aition to the other three arrays use in CRS: a floating-point array! (of length the number of nonzeros) to store the nonzero values, an array (of length the number of blocks) to store the column number of the first nonzero for )& each block, an an array (of length the number of rows) to point to the position where the blocks 3 of each row start. RTS stores the location of the first nonzero of each block in array!. We refer to this storage scheme as blocke compresse row storage (CRS). Figure 3 presents an example of CRS, an the SpMxV operation using this storage is presente in Figure 4. U VXWY W[Z\W / / / W / XW^]XW / XẀ _aw / / / / Ẁ ]XW / / b W / / ]XW HJI IIII = c VXW=e W=fZ\W=e W=J XW=J]XWgJ XWhA_W=e iw=j]7w= b W=f]XWk = c J XA_aJ XJ]XJ XJVl m3 = c J XA_aJVX b Jnl 3 RTS = c A_aJVXfZ\JoXe i e e ae p]l Figure 3: Example of blocke compresse row storage This storage scheme reuces extra loa operations but requires an extra loop uring the SpMxV operation an thus suffers aitional loop overhea. If the sizes of the blocks are small, the overhea ue to the extra loop will ominate the gain ue to ecrease loa operations. Thus, the effectiveness of this storage scheme epens irectly on the sizes of the blocks in the matrix. The total volume of storage has a similar traeoff. Two numbers (one in "#$ an one in RTS store for each block in the matrix, as oppose to one number for each nonzero. Thus, if the blocks are large enough, the total storage size can be significantly reuce. 3 Reorering to Enlarge Dense locks The previous section escribe our ata structures to exploit ense blocks of a matrix. The effectiveness of these ata structures epen irectly on the availability of ense blocks. In this section we escribe 3 ) are

5 /, / * *, ' % O ' > +* for to, o - % ('.*0/ % (' )3% 54 for to '6 q srtsuvw*x"5% +*y/ 3% 3% 4 for O RTS to RTS '&6 - % '.* - % ('74 '89z%! q srtsuva4{ ' +*yw4 o o Figure 4: SpMxV with blocke compresse row storage reorering algorithms to enlarge ense blocks of a matrix. First, we will formally efine the problem an propose a graph moel to reuce the problem to the traveling salesperson problem (TSP). Then we will iscuss briefly heuristics we use for solving TSP. 3. Problem Formulation Our obective in reorering the matrix is to increase the sizes of the ense blocks in a row, i.e., to align the nonzeros in a row in consecutive locations as much as possible. This requires reorering of columns an is not affecte by orering of rows. Thus, rows of the matrix can be reorere without isturbing the aligne nonzeros within a row (e.g., the same reorering can be applie to rows to preserve symmetry). These techniques can also be use to align nonzeros within a column by interchanging the roles of columns an rows. A formal escription of the problem follows. iven an, satisfying r ~< matrix }c r ~< ƒ an > r\9 St ˆ cac r\~, i.e.,, fin an orering of columns to maximize the number of c Š MŒ:M e M L Š r ~ /Žr\ r ~<fƒ / fw pairs In the Appenix, we show that the problem is NP-Complete by using reuction from Hamiltonian Path problem. Thus, we must resort to heuristics for a practical solution. Such an orering problem is naturally close to TSP. However, we are looking for a path, not a tour (cycle) of vertices. Although this is a slightly ifferent version of the problem, heuristics esigne to fin a tour can still be use or aapte to fin a path of vertices. Thus, our strategy will be first to efine a graph moel that reuces our matrix reorering problem to the well-stuie TSP an use heuristics alreay esigne for TSP to reorer our matrices. For the sake of presentation, we will refer to the maximization version of TSP, i.e., iven a graph } c an a weighting function on its eges, fin a tour X> W W W aš š œ >J to maximize

6 FFFFFE, > FFFFFE ž / Ÿ ] _ HJI 9 IIII ž / _ ] 9 Figure 5: Ege weight computation. raph shows ege weights of matrix on left-han sie. Matrix after reorering is presente on right. H I IIII Notice that the weight of the ege c 7š )š ~ š +š c ~ ~hƒ fw is not inclue, since we nee a path, not a tour. Since we are trying to reorer columns of the matrix, the graph that reuces the matrix reorering problem to TSP has vertices representing the columns of the matrix. The weight of an ege between two vertices is efine as the number of rows where both respective columns have a nonzero, i.e., c Ž c Š MŒ)M Š r ~ / rt r ~ ª An alternative efinition, which also gives the basics of an algorithm, is as follows. Let «w T c q ~< matrix of zeros an ones with the same nonzero structure as, i.e., q ~< x r ~< ~< Let Ž««. The weight function can be efine by the matrix c. Figure 5 / illustrates an example of ege weight computation. In this example the weight of the c e p ege is equal to because columns 0 an share a nonzero only in the first row, whereas the weight of the c A_\ ege is equal to because columns an 4 share nonzeros in the first an secon rows. / W / as c Notice that although a weight (possibly zero) is assigne to any pair of vertices in the graph (any orering is a feasible solution for the matrix reorering problem), is expecte to be sparse, which must be exploite for the sake of efficiency (or even existence) of a practical solution. If the vertices an are in consecutive locations in the TSP solution, then the respective columns will be in consecutive locations in the orere matrix, an c nonzeros will be in contiguous locations. The larger the weights of the eges in the tour, the greater the number of nonzeros in contiguous locations will be. In general, fining a tour with maximum weight in this graph correspons to fining an orering with maximum number of contiguous nonzeros. To be more precise, the number of blocks (as in CRS scheme) in the reorere matrix is equal to the number of nonzeros in the matrix minus the total weight of the TSP tour, since each unit of weight correspons to locating a nonzero aacent to another one, thus ecreasing the eª be a

7 V n number of blocks by one. Consequently, a tour with maximum weight escribes an orering with minimum number of blocks. In the example of Figure 5, the matrix has 3 nonzeros. TSP solution use to reorer the matrix is /± ± ± _ ± ] matrix is e] 6 n, the total weight of which is The number of blocks in the reorere 3. Heuristics for TSP As in many other combinatorial optimization problems, heuristics for TSP can be classifie into two groups: constructive an improvement. Constructive heuristics irectly construct a solution for the problem, whereas improvement heuristics start with a given solution an try to improve that solution by searching the neighborhoo. A comprehensive iscussion of TSP solution methos can be foun in [4, 5]. In this work, we aopte heuristics from the literature instea of esigning our own. Here we iscuss briefly the heuristics use in our experiments. Since matrix reorering is propose as a preprocessing step, we focuse on computationally efficient heuristics. The simplest constructive heuristic is to use the initial orering of the matrix. Matrices often have some natural orering that can be use as an initial solution. We also use a vertex insertion proceure. The process starts with an initial path of one ranom vertex, an vertices are inserte one by one to the path until all are inclue in the path. At each step, a vertex that is not in the current path is ranomly chosen an inserte into the path, so that the sum of weights of eges to its successor an preecessor is maximum. The final constructive heuristic we use is to start with a ranom vertex as the initial path an procee by inserting vertices at the en of the path. At each step, the vertex that is connecte to the last vertex of the current path with the heaviest ege weight is inserte at the en of the path. Improvement heuristics have the same flavor as constructive heuristics. One of the heuristics we use epens on vertex insertion. ut this time a vertex is first remove from the current path, unlike the case in constructive heuristics, an then reinserte to maximize the total weight of the tour. We also use ege or path reinsertion proceures, which are similar to vertex insertion. In these heuristics, eges (paths of two vertices) or longer paths are reinserte instea of vertices (name Or-opt proceure in [4]). 4 Experimental Results We implemente the new ata structures an reorering algorithms in C an compare their performances with that of conventional compresse row storage (CRS) scheme. We experimente with a collection of matrices selecte from the Harwell-oeing sparse-matrix collection. All experiments were performe on a Sun Enterprise In the first set of experiments, we z " investigate the effectiveness of our orering techniques. Figure 6 presents our experimental results with blocke matrices after Reverse Cuthill-Mcee (RCM) orering,

8 using the initial orering, an TSP orering (escribe in Section 3). TSP solutions are generate by starting with the initial orering an then using a vertex insertion proceure to improve the initial solution. In Figure 6: Effectiveness of orering Figure 6, SpMxV times are normalize with respect to SpMxV times with the conventional CRS scheme. ² blocking after TSP orering always improves performance an is always superior to the other two orering methos. The ifference becomes very significant for w89 an bcsstk8. On average, TSP orering reuces the runtime of a SpMxV operation to 79% of that of the conventional scheme, whereas RCM orering an using the initial orering are limite to only, 95% an 9%, respectively. Figure 7 presents our results with the two new ata structures. Again, SpMxV times are normalize with respect to SpMxV times with the conventional CRS scheme. Fixe-size blocking is superior to CRS for most matrices an on average. CRS outperforms fixe-size blocking for four matrices: bcsstk8, cavity6, bcsstk30, an bcsstk3. We also experimente with minor moifications of the ata structures. For instance, using? ] blocks instea of " ³ increases the performance by 3% on average, but further increasing the block size oes not help. Using blocke compresse row storage only for blocks of size greater than an using the conventional scheme for the remainer increase the performance by 8%, compare with blocke compresse row storage. We are in the process of tuning our ata structures for maximum performance. The results show that significant savings can be achieve by exploiting the ense blocks in a matrix. Reorering the matrices yiels notable improvement in performance, offsetting the cost of the preprocessing phase, which is often amortize over repeate SpMxV operations with the same matrix.

9 5 Conclusions an Future Work Figure 7: Comparison of ata structures We have presente new ata structures, along with a matrix reorering algorithm to increase the effectiveness of those ata structures, esigne to ecrease the number of memory inirections uring sparse matrix-vector multiplication. The ata structures exploit ense blocks nonzeros in contiguous locations of the matrix. We also propose a reorering algorithm to enlarge the ense blocks of a matrix. Experiments verify the effectiveness of propose techniques, with observe performance improvement of up to 33% an an average improvement of %. Currently we are working on improving the performance of the propose techniques. We are also investigating alternative ways of exploiting the ensity in the sparse matrices by esigning aitional new ata structures. Finally, we plan to experiment with various architectures to observe the performance of these techniques with a variety of architectural parameters. References [] R. C. Agarwal, F.. ustavson, an M. Zubair, A high performance algorithm using pre-processing for sparse matrix vector multiplication, Proceeings of Supercomputing 9, pp [] D. A. urgess an M.. iles, Renumbering unstructure gris to improve the performance of coes on hierarchical memory machines, Tech. Rep. 95/06, Numerical Analysis roup, Oxfor University Computing laboratory, May 995. [3] R. Das, D. J. Mavriplis, J. Saltz, S. upta, an R. Ponnusamy, The esign an implementation of a parallel unstructure Euler solver using software primitives, AIAA Journal, No: 3, pp , 994. [4] J. Perttunen, The traveling salesman problem: the significance of initial solutions in composite heuristics, Vaasan orkeakoulun ulkaisua, no. 39, 989.

10 c / / [5]. Reinelt The traveling salesman: computational solutions for TSP applications, Lecture Notes in Computer Science, Vol: 840, Springer-Verlag, 994. [6] O. Temam an W. Jalby, Characterizing the behavior of sparse algorithms on caches, Proceeings of Supercomputing 9, 99. [7] S. Toleo, Improving Memory-System Performance of Sparse Matrix-Vector Multiplication, Proceeings of the 8th SIAM Conference on Parallel Processing for Scientific Computing, March 997. Appenix NP-Completeness of Problem In this section, we prove that orering a sparse matrix to increase sizes of ense blocks is NP-Complete by using reuction from the Hamiltonian Path problem. First we state a ecision version of the problem: iven an, r ~< matrix ^c, ecie if there exists an orering of columns, where the number of pairs satisfying r ~< iven a simple graph c r ~# ƒ an > is greater than or equal to a given boun µ. (no loops, no parallel eges), construct an matrix. In this matrix each row represents an ege an each column represents a vertex in the graph. Let the th column represent the th vertex. The nonzero structure matrix rj~ is efine such that there are nonzeros at an r J¹ ~ for each ege c ¹. To increase the size of ense blocks, we have to bring the columns of aacent vertices to consecutive locations in the reorere matrix. Notice that two aacent columns can share nonzeros in at most one row, 6 because there are no parallel eges. There can be at most º ² blocks of size after reorering, achieve when the vertices of consequent columns share an ege in the graph, which efines a Hamiltonian path in the graph. It is also easy to see the problem is in NP, since a given solution can be verifie in polynomial time. So we can conclue that the problem is NP-Complete.

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science and Center of Simulation of Advanced Rockets University of Illinois at Urbana-Champaign

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

+ E. Bit-Alignment for Retargetable Code Generators * 1 Introduction A D T A T A A T D A A. Keen Schoofs Gert Goossens Hugo De Mant

+ E. Bit-Alignment for Retargetable Code Generators * 1 Introduction A D T A T A A T D A A. Keen Schoofs Gert Goossens Hugo De Mant Bit-lignment for Retargetable Coe Generators * Keen Schoofs Gert Goossens Hugo e Mant IMEC, Kapelreef 75, B-3001 Leuven, Belgium bstract When builing a bit-true retargetable compiler, every signal type

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

2 do i = 1,n sum = 0.0D0 do j = rowptr(i), rowptr(i+1)-1 sum = sum + a(jp) * x(colind(jp)) end do y(i) = sum end do Fig. 1. A sparse matrix-vector mul

2 do i = 1,n sum = 0.0D0 do j = rowptr(i), rowptr(i+1)-1 sum = sum + a(jp) * x(colind(jp)) end do y(i) = sum end do Fig. 1. A sparse matrix-vector mul Improving Memory-System Performance of Sparse Matrix-Vector Multiplication Sivan Toledo y Abstract Sparse matrix-vector multiplication is an important kernel that often runs ineciently on superscalar RISC

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Classical Mechanics Examples (Lagrange Multipliers)

Classical Mechanics Examples (Lagrange Multipliers) Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Finite Automata Implementations Considering CPU Cache J. Holub

Finite Automata Implementations Considering CPU Cache J. Holub Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton

More information

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance New Version of Davies-Boulin Inex for lustering Valiation Base on ylinrical Distance Juan arlos Roas Thomas Faculta e Informática Universia omplutense e Mari Mari, España correoroas@gmail.com Abstract

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

AMS526: Numerical Analysis I (Numerical Linear Algebra)

AMS526: Numerical Analysis I (Numerical Linear Algebra) AMS526: Numerical Analysis I (Numerical Linear Algebra) Lecture 5: Sparse Linear Systems and Factorization Methods Xiangmin Jiao Stony Brook University Xiangmin Jiao Numerical Analysis I 1 / 18 Sparse

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

ETNA Kent State University

ETNA Kent State University Electronic Transactions on Numerical Analysis. Volume 2, pp. 75-85, 25. Copyright 25,. ISSN 168-9613. CROUT VERSIONS OF ILU FACTORIZATION WITH PIVOTING FOR SPARSE SYMMETRIC MATRICES NA LI AND YOUSEF SAAD

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Bayesian localization microscopy reveals nanoscale podosome dynamics

Bayesian localization microscopy reveals nanoscale podosome dynamics Nature Methos Bayesian localization microscopy reveals nanoscale poosome ynamics Susan Cox, Ewar Rosten, James Monypenny, Tijana Jovanovic-Talisman, Dylan T Burnette, Jennifer Lippincott-Schwartz, Gareth

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

Tight Wavelet Frame Decomposition and Its Application in Image Processing

Tight Wavelet Frame Decomposition and Its Application in Image Processing ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department

More information

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Journal of Cybernetics and Informatics. Slovak Society for Cybernetics and Informatics

Journal of Cybernetics and Informatics. Slovak Society for Cybernetics and Informatics Journal of Cybernetics an Informatics publishe by Slovak Society for Cybernetics an Informatics Volume 13, 1 http://www.sski.sk/casopis/inex.php (home page) ISSN: 1336-4774 Journal of Cybernetics an Informatics

More information

Blocked-Based Sparse Matrix-Vector Multiplication on Distributed Memory Parallel Computers

Blocked-Based Sparse Matrix-Vector Multiplication on Distributed Memory Parallel Computers The International Arab Journal of Information Technology, Vol. 8, No., April Blocked-Based Sparse Matrix-Vector Multiplication on Distributed Memory Parallel Computers Rukhsana Shahnaz and Anila Usman

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

Sampling the Disparity Space Image

Sampling the Disparity Space Image Accepte for publication, June 2003. To appear in IEEE Transactions on Pattern Analysis an Machine Intelligence (PAMI) Sampling the Disparity Space Image Richar Szeliski Daniel Scharstein Microsoft Research

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information