d 3 d 4 d d d d d d d d d d d 1 d d d d d d
|
|
- Lynne Greer
- 5 years ago
- Views:
Transcription
1 Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching Chen School of Computer Science Floria International University Miami, FL 331 Mei-Ling Shyu School of Electrical an Computer Engineering Purue University West Lafayette, IN 40 Chi-Min Shu Department of Environmental Safety Engineering National Yunlin University of Science an Technology Yunlin, Taiwan, R.O.C ABSTRACT A large scale network may consist of hunres of isparate an autonomous atabases. Users in such an information-proviing environment usually access information from those atabases in the same or similar application omains so that there is no nee to hanle all the entities from all the atabases. That is, in most cases, only a subset of atabases is require for the users' requests. As the number of atabases increases, the nee to manage such a network of atabases increases. In this paper, we present a split/cluster approach using the object-oriente technique to allow users to incrementally an ynamically access the information they want without being overwhelme with all of the unstructure information. The approach is base on the anity relationships of the atabases an is performe recursively to split these atabases into clusters. Then a cluster hierarchy is forme to provie ierent levels of abstractions for the users. This framework provies a exible means of sharing information to all the atabases. Theoretical terms along with a running example are presente. Key wors: Object-oriente atabases, anity, clustering, splitting. 1. INTRODUCTION Integrating heterogeneous atabases is a challenging problem since incompatibilities exist among all the atabases [3]. To provie as transparent as possible a atabase schema, conicts nee to be resolve before it can provie a view to the users. A number of researchers have investigate the problem of integrating heterogeneous atabases [1] [] []. However, the issues of conict resolutions are not iscusse in this paper since we try to focus on managing the network of atabases to help users better utilize the information in the atabases. In such a large scale atabase network, queries ten to traverse ata relate to the same or similar application omains an which resie in ierent atabases. Most of the queries request information from a small fraction of the atabases in the network without the nee to show all the entities of all the atabases. This motivates us to split the network of atabases recursively into benecial clusters base on the access behavior of application queries. An example of grouping close to the concept of ours is the Internet [4]. The Internet is a computer network consisting of several connecte subnetworks. Every subnetwork follows its own communication protocols an is usually set up to serve some special purposes. One ierence between these two concepts is that all the subnetworks provie almost the same set of information; while each cluster in the propose approach can provie iverse sets of information. In this paper, an object-oriente split/cluster approach is propose. The object-oriente paraigm is aopte since things in the worl aroun us have properties or features; we can think of ata as an object class with its ening attributes. The anity measures between every pair of atabases are formalize an calculate base on the access behavior of application queries. Each query may be activate several times an hence each query has its access frequency. Therefore, the access frequency of a query per time perio shoul be taken into account in the anity measures. The splitting proceure is base on the anity relationships of the atabases an is performe recursively to split these atabases into clusters. After the split/cluster step, a cluster hierarchy is generate. The cluster hierarchy provies ierent levels of abstractions an hence allows users to incrementally an ynamically access the pieces of information they want without being overwhelme with all of the unstructure information. The constructe clusters can be use as the unit not only for query processing but also for iscovering the objectoriente relationships such as superclass, subclass, an equivalence relationships, which is the subject of a forthcoming paper. For those users who wish
2 to access only parts of the atabases, they can access the ata from the appropriate clusters without going through the whole network of atabases. In other wors, the propose approach provies a exible means of sharing information to all the atabases. This paper is organize as follows. In Section, the propose object-oriente approach with relative anity formulations an the split/cluster proceure is introuce. A simple example is given to illustrate the steps of the split/cluster proceure. Section 4 conclues this paper.. PROPOSED OBJECT-ORIENTED APPROACH A set of historical queries which are issue to the atabases in the network is use as a priori for the split/cluster proceure. We use the relative anity values to measure how frequently two atabases have been accesse together in the set of historical queries. Realistically, it cannot be expecte that the user applications are able to specify these anity values an hence formulas nee to be ene..1. Relative Anity Measures Let Q = fq1, q, : : :, q q g be the set of queries that run on the set of atabases D = f1,, : : :, g in the large scale atabase environment. Dene the variables: use i () = a vector of length q inicating the usage patterns of i with respect to all the queries in Q. For each atabase i, use i () is ene as follows an the kth entry of use i () enotes the usage pattern of i with respect to q k. use i () = 1 if object classes in i is accesse by q k 0 otherwise access() = a vector of length q inicating the access frequencies of the queries in Q per time perio. The kth entry of access() enotes the access frequency for query q k. rel(i, j) = P q k=1 use i(q k ) use j (q k ) access(q k ) = the anity value of atabase i an j. M=a matrix of size gg inicating the anity measures of the atabases in a group DB GROUP IJ with respect to all queries in Q assuming DB GROUP IJ = f1; ;... ; g g. The rel(i, j) value is place at the (i,j)th entry in M. Note that M is a symmetric matrix an for simplicity, only the entries which i j are compute. The (i,j)th entry will have the same result as the (j,i)th entry an the (i,i)th entry will not be use in the split/cluster proceure PP(i,j) = a closeness ierence function which calculates the closeness ierence between column i for i an column j for j. Let O represent a temporary matrix in the split/cluster proceure which contains the rst several columns of M. For every possible pair of neighbors i an j, PP(i,j) is e- ne as follows: PP(i,j)=M(1,i)-O(1,j) if i is put to the left of j PP(j,i)=O(1,j)-M(1,i) if i is put to the right of j.. Split/Cluster Proceure The objective of the split/cluster proceure is to n several clusters of atabases that are accesse together more frequently by the set of queries. For a large scale atabase environment, this split/cluster proceure shoul be invoke iteratively to form the cluster hierarchy. The split/cluster proceure takes the primary ata as inputs, computes the entities of the matrix M, calculates the closeness ierence values, permutes its columns, an then generates an upate matrix M. A function PP(i,j) is ene to calculate the ierence of two anity values of the nearby neighbors for each possible position ( i ; j ) base on the entries in M. The permutation is one by consiering the minimum of the PP values for each atabase. The PP(i,j) function is esigne to be the closeness ierence for two columns i an j. Let column i be the one that nees to be place in the temporary matrix O where O consists of the rst several columns of matrix M. Column i can be place on the left or right of column j in O. The main iea is to position column i in the place which satises two conitions: its anity measure shoul be less than or equal to the anity measure of its left neighbor an greater than or equal to the anity measure of its right neighbor. For the leftmost or the rightmost position of O, simply consier one of the above two conitions because it has only one neighbor in such cases. For each closeness ierence value, check whether it is less than zero. If yes, ignore this possible position since a negative ierence means the require conitions are not satise. Since the proceure computes only the closeness ierences of the nearby neighbors an consiers the minimum of the ierences, it tens to partition the matrix M into two clusters - one is in the upper left corner an the other is in the lower right corner. In general the borer for the split is not very clear-cut. For this purpose, a splitting phase is propose to ecie the split point. The splitting phase compares the mean value of the rst column with each iniviual value in that column in M. If the iniviual value is greater than or equal to the mean value, then it belongs to the upper left corner group. Other-
3 wise, it belongs to the lower right corner group. Two clusters can therefore be generate at each iteration. The mean value of the rst column is chosen to be the splitting criterion since the rst column tens to have the larger anity values. However, there must be some stopping criteria to en the iterations. There are two stopping criteria for each split/cluster proceure iteration: (1) when the size of a cluster is one, i.e. the number of atabases in the cluster is one, an () when the size of a cluster is less than four. If one of the above conitions is satise, then there is no more splitting for that cluster since it makes no sense to have a cluster with only one element in the cluster. Otherwise, each cluster executes the split/cluster proceure iteratively until one of the conitions is met. Initially, the split/cluster proceure is applie to all the atabases in the network. The proceure is iterate until no more splitting is permitte. Steps for the split/cluster proceure: 1. Preparation of the primary ata: The primary ata require are access() an use i () where i=1 : : : ( is the total number of atabases). These vectors are given as a priori from a set of historical queries. However, since the application queries issue to the atabases can be recore per time perio (say monthly or annually), the require ata can be upate accoringly.. Computation of the entries in M: rel(i; j) = P q k=1 use i(q k ) use j (q k ) access(q k ), where i, j=1 : : :. 3. Determination of the cluster size: Each cluster in the cluster hierarchy is an input to the split/cluster proceure. The size of a cluster (g) is the number of atabases in the cluster. Initially, g= since the input cluster consists of all the atabases in the network. Assuming DB GROU P I J = f1; ; : : : ; g g, g <= =) the size of DB GROU P I J = g. 4. for loop1 = 1 to g-1 = initialization of the matrix O = = place the rst loop1+1 columns of M into O = O(, 1) = M(, ); O(, ) = M(, ); : : : O(, loop1+1) = M(, loop1+1); for loop = loop1+ to g For each column in the the remaining g-(loop1+1) columns, calculate a PP vector for the loop possible positions for that column. Select the position by the minimum PP value. = position selections = Once the position for the column is etermine, permute the columns in O if necessary. Place the column into its corresponing position in O. = column permutations = en Once the positions for the remaining g-(loop1+1) columns are etermine, the permutations of corresponing rows are performe so that the relative positions in O are maintaine. = row permutations = M = O = upate M = en. Splitting phase: Compute the mean value of the rst column of the matrix M. This mean value is then use as the criterion for the splitting phase. Two clusters are generate from the matrix M after the splitting phase is applie. 6. Stopping criteria checking for each cluster generate in step : If the size of the cluster is one, then no splitting for this cluster an stop. Else goto step for each cluster. If the size of the cluster is less than four, then no splitting for this cluster an stop. Else goto step for each cluster.. Generating a cluster hierarchy: After all the clusters execute the split/cluster proceure an nish the stopping criteria checking, a cluster hierarchy for all the atabases in the network can be create. 3. AN EXAMPLE In this section, a simple example is use to illustrate the propose split/cluster proceure. Once the network of atabases is partitione into several clusters an each cluster consists of one or more atabases which have high anity relationships, the cost of query processing can be reuce. Example: Suppose there are atabases in the network an the historical ata consists of queries. Let D = f 1 ; ; : : : ; g an Q = fq 1 ; q ; : : : ; q g. Assume the following use i () where i=1 : : :, an access() values are the require primary ata obtaine from the set of historical ata.
4 Figure 1: Initial Anity Measure Matrix M. Each entity (i,j) in M has the relative anity value rel(i,j), where i,j=1 to. use 1 () = [ ]; use () = [ ]; use 3 () = [ ]; use 4 () = [ ]; use () = [ ]; use 6 () = [ ]; use () = [ ]; use () = [ ]; use () = [ ]; use () = [ ]; access() = [ ]; With the availability of the primary ata, the relative anity values can be calculate. For example, the anity measure for the entity M(1,) can be obtaine by the following way. M(1,) P = rel(1, ) = k=1 use 1(q k ) use (q k ) access(q k ) = access(q1) + access(q4) + access(q) = 1. Figure : Final Anity Measure Matrix. The ashe lines separate two clusters. PP(,3)). Position 1: to the left of column 1, PP(3,1) = M(1,3) - O(1,1) = - 1 < 0; Position : in between column 1 an column, PP(1,3) = O(1,1) - M(1,3) = 1 - = ; PP(3,) = M(1,3) - O(1,) = - 0 < 0; Position 3: to the right of column, PP(,3) = O(1,) - M(1,3) = 0 - = 4; Since the PP values for positions 1 an are negative, these two possibilities are ignore. Therefore, we select to place 3 to the right of column. Similarly, all the other atabases are calculate to get an upate matrix. Finally, the rows are permute to be in the same orer as the columns. The same steps are applie for iterations to to get the - nal anity measure matrix M which is then use to illustrate the splitting phase. First, the mean of the rst column is calculate. Similarly, all the rel(i,j) entities for M can be compute. The initial anity measure matrix M is shown in Figure 1. As shown in Figure 1, each entity (i,j) in M has the value of rel(i,j) which inicates the relative anity measure for atabase i an j. In aition, M is symmetric so that the entity (i,j) has the same value as in the entity (j,i). For example, M(1,) an M(,1) have the same value 1. Take the initial anity measure matrix M an execute the rst iteration, i.e., when loop1=1. Accoring to our propose split/cluster proceure, initially the rst two columns of M are place into the temporary matrix O an column 3 (i.e., 3) is consiere next. There are three possible positions for column 3: to the left of column 1 (computing PP(3,1)), in between column 1 an (computing PP(1,3) an PP(3,)), an to the right of column (computing mean = ( )/ = 4.; Accoring to the propose splitting phase, the mean value is use to consier the splitting of the matrix M. Therefore, two clusters are create: one is in the upper left corner an the other is in the lower right corner (see the ashe line in Figure ). Let the upper left corner cluster be DB GROUP 1 = f1,,,, g an the lower right corner cluster be DB GROUP = f3, 4, 6,, g. Since both clusters contain more than three atabases, each cluster nees to execute the split/cluster phase iteratively. Again, the mean value for each cluster nees to be calculate an use as the splitting criterion. Base on the mean values, the clusters DB GROUP 1 an DB GROUP 1 are further split into two more
5 (a) Figure 3: Splitting for the two clusters. Each cluster can be split into two more clusters (as shown in the ashe lines). clusters iniviually (the ashe lines in Figure 3(a) an 3(b)). Since the numbers of atabases in all the four clusters are less than four, the proceure stops. mean = ( )/ = (for DB GROUP 1 ) mean = ( )/ = 4 (for DB GROUP ) After all the clusters execute the split/cluster proceure an the stopping criteria checking, a cluster hierarchy for all the atabases in the network can be create. As shown in Figure 4, the cluster DB GROUP 11 which consists of all the atabases in the network is at the root of the hierarchy. Initially, the split/cluster proceure starts with DB GROUP 11 an partitions it into two clusters DB GROUP 1 an DB GROUP. Then, DB GROUP 1 can be partitione into DB GROUP 31 an DB GROUP 3, an DB GROUP can be partitione into DB GROUP 33 an DB GROUP 34. Each ner cluster consists of its own atabases. Those atabases in the same cluster shoul be highly aliate an be accesse for query information. This cluster hierarchy is then use to ecie where a query shoul be searche for the requeste information to reuce the cost of query processing. 4. CONCLUSIONS In this paper, we propose an object-oriente approach to partition a large scale network of atabases into a set of clusters. We have formalize a new set of relative anity measures to represent how frequently two atabases have been accesse together by a set of historical queries. Anity-base measures are both intuitively reasonable an unerstanable since they consier the access frequencies of queries. We gave a split/cluster proceure for clustering the atabases. The split/cluster proceure inclues a splitting phase an two stopping criteria, an is execute iteratively. A simple example is run to illustrate the steps of the propose split/cluster proceure. A cluster hier (b) Figure 4: The resulting cluster hierarchy. The lowest level of the hierarchy consists of the iniviual atabases in the network. The root cluster of the hierarchy consists of all the atabases. The clusters at each level have their own member atabases. archy which provies ierent levels of abstractions for users to incrementally an ynamically access the information is forme. Since a set of atabases belonging to a certain application omain is place in the same cluster an is require consecutively on some query access path, the number of platter switches for query processing can be reuce. Moreover, the constructe clusters can be use as the unit not only for query processing but also for iscovering the objectoriente relationships such as superclass, subclass, an equivalence relationships. References [1] D.M. Dilts an W. Wu, Using knowlege-base technology to integrate CIM atabases, IEEE Trans. Knowlege Data Eng., vol. 3(), June 11. [] W. Gotthar, P.C. Lockemann, an A. Neufel, System-guie view integration for objectoriente atabases, Knowlege Data Eng., vol. 4(1), Feb. 1. [3] W. Litwin, L. Mark, an N. Roussopoulos, Interoperability of multiple autonomous atabases, ACM Computing Surveys,, 10, pp [4] J.S. Quarterman an J.C. Hoskins, Notable computer networks, Communication of ACM, vol. (), 16, pp [] M.P. Rey, B.E. Prasa, P.G. Rey, an A. Gupta, A methoology for integration of heterogeneous atabases, IEEE Trans. Knowlege Data Eng., vol. 6(6), December 14.
Online Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationWaleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University
Dierential I DDQ Testable Static RAM Architecture Walee K. Al-Assai Anura P. Jayasumana Yashwant K. Malaiya y Technical Report CS-96-102 February 1996 Department of Electrical Engineering/ y Department
More informationRoute Registries (IRRs) [1] are use to store an istribute RPSL specications. Thir, a collection of software tools, calle the RAToolSet [2], gives netw
An Analysis of BGP Convergence Properties Timothy G. Grin griffin@research.bell-labs.com, Goron Wilfong Bell Laboratories, Lucent Technologies 6 Mountain Avenue, Murray Hill NJ gtw@research.bell-labs.com
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationthe probabilistic network subsystem
Discovering Quasi-Equivalence Relationships from Database Systems Mei-Ling Shyu Shu-Ching Chen R. L. Kashyap School of Electrical and School of Computer Science School of Electrical and Computer Engineering
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationWilliam S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract
Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology
More informationEFFICIENT STEREO MATCHING BASED ON A NEW CONFIDENCE METRIC. Won-Hee Lee, Yumi Kim, and Jong Beom Ra
th European Signal Processing Conference (EUSIPCO ) Bucharest, omania, August 7-3, EFFICIENT STEEO MATCHING BASED ON A NEW CONFIDENCE METIC Won-Hee Lee, Yumi Kim, an Jong Beom a Department of Electrical
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationTHE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM
International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationA FUZZY FRAMEWORK FOR SEGMENTATION, FEATURE MATCHING AND RETRIEVAL OF BRAIN MR IMAGES
A FUZZY FRAMEWORK FOR SEGMENTATION, FEATURE MATCHING AND RETRIEVAL OF BRAIN MR IMAGES Archana.S 1 an Srihar.S 2 1 Department of Information Science an Technology, College of Engineering, Guiny archana.santhira@gmail.com
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationVerifying performance-based design objectives using assemblybased vulnerability
Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA
More informationPolitehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques
Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationTop-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications
Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationWireless Sensing and Structural Control Strategies
Wireless Sensing an Structural Control Strategies Kincho H. Law 1, Anrew Swartz 2, Jerome P. Lynch 3, Yang Wang 4 1 Dept. of Civil an Env. Engineering, Stanfor University, Stanfor, CA 94305, USA 2 Dept.
More informationGraphics Calculator Applications to Maximum and Minimum Problems on Geometric Constructs
Graphics Calculator Applications to Maximum an Minimum Problems on Geometric Constructs Expressing the size of constructs in terms of the istances between the vertices enables one to easily examine other
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationPART 2. Organization Of An Operating System
PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms
More informationDesign Management Using Dynamically Defined Flows
Design Management Using Dynamically Deine Flows Peter R. Sutton*, Jay B. Brockman** an Stephen W. Director* *Department o Electrical an Computer Engineering, Carnegie Mellon University, Pittsburgh, PA
More information. The problem: ynamic ata Warehouse esign Ws are dynamic entities that evolve continuously over time. As time passes, new queries need to be answered
ynamic ata Warehouse esign? imitri Theodoratos Timos Sellis epartment of Electrical and Computer Engineering Computer Science ivision National Technical University of Athens Zographou 57 73, Athens, Greece
More informationNew Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance
New Version of Davies-Boulin Inex for lustering Valiation Base on ylinrical Distance Juan arlos Roas Thomas Faculta e Informática Universia omplutense e Mari Mari, España correoroas@gmail.com Abstract
More informationCompiler Optimisation
Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationImage compression predicated on recurrent iterated function systems
2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty
More informationINFORMATION RETRIEVAL USING MARKOV MODEL MEDIATORS IN MULTIMEDIA DATABASE SYSTEMS. Mei-Ling Shyu, Shu-Ching Chen, and R. L.
INFORMATION RETRIEVAL USING MARKOV MODEL MEDIATORS IN MULTIMEDIA DATABASE SYSTEMS Mei-Ling Shyu, Shu-Ching Chen, and R. L. Kashyap School of Electrical and Computer Engineering Purdue University, West
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationAnalysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space
Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More information[2006] IEEE. Reprinted, with permission, from [Damith C. Herath, Sarath Kodagoda and Gamini Dissanayake, Simultaneous Localisation and Mapping: A
[6] IEEE. Reprinte, with permission, from [Damith C. Herath, Sarath Koagoa an Gamini Dissanayake, Simultaneous Localisation an Mapping: A Stereo Vision Base Approach, Intelligent Robots an Systems, 6 IEEE/RSJ
More informationRecitation Caches and Blocking. 4 March 2019
15-213 Recitation Caches an Blocking 4 March 2019 Agena Reminers Revisiting Cache Lab Caching Review Blocking to reuce cache misses Cache alignment Reminers Due Dates Cache Lab (Thursay 3/7) Miterm Exam
More informationOne-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks
Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm
More informationMODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services
MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright
More informationSolutions to Tutorial 1 (Week 8)
The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two
More informationExperion PKS R500 Migration Planning Guide
Experion PKS R500 Migration Planning Guie EPDOC-XX70-en-500E May 2018 Release 500 Document Release Issue Date EPDOC-XX70- en-500e 500 0 May 2018 Disclaimer This ocument contains Honeywell proprietary information.
More informationDisjoint Multipath Routing in Dual Homing Networks using Colored Trees
Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationP. Fua and Y. G. Leclerc. SRI International. 333 Ravenswood Avenue, Menlo Park, CA
Moel Driven Ege Detection P. Fua an Y. G. Leclerc SI International 333 avenswoo Avenue, Menlo Park, CA 9425 (fua@ai.sri.com leclerc@ai.sri.com) Machine Vision an Applications, 3, 199 Abstract Stanar ege
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationAn Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract
An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationPairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:
airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationA Plane Tracker for AEC-automation Applications
A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)
More informationData Mining: Concepts and Techniques. Chapter 7. Cluster Analysis. Examples of Clustering Applications. What is Cluster Analysis?
Data Mining: Concepts an Techniques Chapter Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign www.cs.uiuc.eu/~hanj Jiawei Han an Micheline Kamber, All rights reserve
More informationChange Patterns and Change Support Features in Process-Aware Information Systems
hange Patterns an hange Support eatures in -Aware Information Systems arbara Weber 1,, Stefanie Rinerle 2, an Manfre Reichert 3 1 Quality ngineering Research Group, University of Innsbruck, Austria arbara.weber@uibk.ac.at
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationDense Disparity Estimation in Ego-motion Reduced Search Space
Dense Disparity Estimation in Ego-motion Reuce Search Space Luka Fućek, Ivan Marković, Igor Cvišić, Ivan Petrović University of Zagreb, Faculty of Electrical Engineering an Computing, Croatia (e-mail:
More informationResearch Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks
Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationProblem Paper Atoms Tree. atoms.pas. atoms.cpp. atoms.c. atoms.java. Time limit per test 1 second 1 second 2 seconds. Number of tests
! " # %$ & Overview Problem Paper Atoms Tree Shen Tian Harry Wiggins Carl Hultquist Program name paper.exe atoms.exe tree.exe Source name paper.pas atoms.pas tree.pas paper.cpp atoms.cpp tree.cpp paper.c
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic
More informationTowards an Adaptive Completion of Sparse Call Detail Records for Mobility Analysis
Towars an Aaptive Completion of Sparse Call Detail Recors for Mobility Analysis Guangshuo Chen, Aline Carneiro Viana, Carlos Sarraute To cite this version: Guangshuo Chen, Aline Carneiro Viana, Carlos
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationImpact of cache interferences on usual numerical dense loop. nests. O. Temam C. Fricker W. Jalby. University of Leiden INRIA University of Versailles
Impact of cache interferences on usual numerical ense loop nests O. Temam C. Fricker W. Jalby University of Leien INRIA University of Versailles Niels Bohrweg 1 Domaine e Voluceau MASI 2333 CA Leien 78153
More informationBlind Data Classification using Hyper-Dimensional Convex Polytopes
Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationTopics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.
Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationA PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset
Vol.3, Issue.1, Jan-Feb. 013 pp-504-508 ISSN: 49-6645 A PSO Optimize Layere Approach for Parametric Clustering on Weather Dataset Shikha Verma, 1 Kiran Jyoti 1 Stuent, Guru Nanak Dev Engineering College
More information6.823 Computer System Architecture. Problem Set #3 Spring 2002
6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationSoftware Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency
Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationI DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO
I DT MC Operating Manual SINAMICS S20 Verification of Performance Level e in accorance with EN ISO 3849- Document Project Status: release Organization: I DT MC Baseline:.2 Location: Erl. F80 Date: 24.09.2009
More informationNAND flash memory is widely used as a storage
1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage
More information