GARBAGE COLLECTION METHODS. Hanan Samet

Size: px
Start display at page:

Download "GARBAGE COLLECTION METHODS. Hanan Samet"

Transcription

1 gc0 GARBAGE COLLECTION METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 Copyight 997 Hanan Samet These notes may not e epoduced y any means (mechanical o electonic o any othe) without the epess witten pemission of Hanan Samet

2 GARBAGE COLLECTION 8 gc Management of stoage allocation fom a heap (e.g., stings, lists, etc.) Allocation is usually eplicit (e.g., CONS in LISP, NEW in PASCAL) Deallocation is eplicit o implicit. PL/: eplicit via FREE. LISP: implicit via gaage collection pocess of detemining what pat of stoage is no longe eing efeenced and etuning it to the availale pool pocedue evese(); if empty() then else evese(,ω); pocedue evese(,y) if empty() then y else evese(est(),add(fist(),y)); add(,y) gas a -element cell fom AVAIL and yields evese[(a B C)] evese[(a B C),Ω] y y Ω Ω A B C

3 GARBAGE COLLECTION 8 gc Management of stoage allocation fom a heap (e.g., stings, lists, etc.) Allocation is usually eplicit (e.g., CONS in LISP, NEW in PASCAL) Deallocation is eplicit o implicit. PL/: eplicit via FREE. LISP: implicit via gaage collection pocess of detemining what pat of stoage is no longe eing efeenced and etuning it to the availale pool pocedue evese(); if empty() then else evese(,ω); pocedue evese(,y) if empty() then y else evese(est(),add(fist(),y)); add(,y) gas a -element cell fom AVAIL and yields evese[(a B C)] evese[(a B C),Ω] y y y Ω Ω Ω A B C A

4 GARBAGE COLLECTION z 8 gc Management of stoage allocation fom a heap (e.g., stings, lists, etc.) Allocation is usually eplicit (e.g., CONS in LISP, NEW in PASCAL) Deallocation is eplicit o implicit. PL/: eplicit via FREE. LISP: implicit via gaage collection pocess of detemining what pat of stoage is no longe eing efeenced and etuning it to the availale pool pocedue evese(); if empty() then else evese(,ω); pocedue evese(,y) if empty() then y else evese(est(),add(fist(),y)); add(,y) gas a -element cell fom AVAIL and yields evese[(a B C)] evese[(a B C),Ω] y y y y Ω Ω Ω A B C B A

5 GARBAGE COLLECTION g z 8 gc Management of stoage allocation fom a heap (e.g., stings, lists, etc.) Allocation is usually eplicit (e.g., CONS in LISP, NEW in PASCAL) Deallocation is eplicit o implicit. PL/: eplicit via FREE. LISP: implicit via gaage collection pocess of detemining what pat of stoage is no longe eing efeenced and etuning it to the availale pool pocedue evese(); if empty() then else evese(,ω); pocedue evese(,y) if empty() then y else evese(est(),add(fist(),y)); add(,y) gas a -element cell fom AVAIL and yields evese[(a B C)] evese[(a B C),Ω] y Ω y y y Ω Ω y Ω A B C C B A

6 GARBAGE COLLECTION 5 v g z 8 gc Management of stoage allocation fom a heap (e.g., stings, lists, etc.) Allocation is usually eplicit (e.g., CONS in LISP, NEW in PASCAL) Deallocation is eplicit o implicit. PL/: eplicit via FREE. LISP: implicit via gaage collection pocess of detemining what pat of stoage is no longe eing efeenced and etuning it to the availale pool pocedue evese(); if empty() then else evese(,ω); pocedue evese(,y) if empty() then y else evese(est(),add(fist(),y)); add(,y) gas a -element cell fom AVAIL and yields evese[(a B C)] evese[(a B C),Ω] y Ω y y y Ω Ω y Ω A B C C B A new cells have een allocated List (A B C) peviously pointed at y is no longe elevant o pointed at y the esult of evese (A B C) is gaage if no othe pat of the pogam can access it

7 STORAGE MAP 8 gc View of memoy used fee A B C D E G F H I J K L M N O P Q

8 STORAGE MAP 8 gc View of memoy used fee accessile inaccessile A B C D E G F H I J K L M N O P Q

9 STORAGE MAP z 8 gc View of memoy used fee accessile inaccessile used fee Gaage collection is the pocess of coalescing FREE and INACCESSIBLE to fom a new FREE aea A B C D E G F H I J K L M N O P Q

10 STORAGE MAP g z 8 gc View of memoy used fee accessile inaccessile used fee Gaage collection is the pocess of coalescing FREE and INACCESSIBLE to fom a new FREE aea A B C D E G F H I J K L M N O P Q. A, G, and M ae the immediately accessile cells mak all accessile cells A, B, C, D, E, F, G, H, I, J, L, M, and N

11 STORAGE MAP 5 v g z 8 gc View of memoy used fee accessile inaccessile used fee Gaage collection is the pocess of coalescing FREE and INACCESSIBLE to fom a new FREE aea A B C D E G F H I J K L M N O P Q. A, G, and M ae the immediately accessile cells mak all accessile cells A, B, C, D, E, F, G, H, I, J, L, M, and N. K, O, P, and Q ae inaccessile and ae gaage collected

12 STORAGE MANAGEMENT TECHNIQUES gc. Use keeps diect contol dange is dangling efeences if stoage shaed, feeing a lock causes polems if anothe pat of pogam elieves the lock is still in use X A B D E Z A a. '(D E) is shaed y the inding of X and Z. deallocating inding of Z leaves a dangling efeence to '(D E) in the inding of X. System contol via use of efeence countes incement wheneve allocate stoage o a cell is ound to an additional vaiale decement when cell is no longe eing efeenced (i.e., at lock eit) deallocation when efeence counte is zeo dawacks a. countes equie space can stoe sepaately fom data (sepaation of data and contol). ecusive stuctues such as cicula lists will neve have thei efeence countes go to zeo. Gaage collection system eplenishes availale pool of stoage

13 MECHANICS OF GARBAGE COLLECTION gc Two phases:. mak all accessile nodes. sweep though memoy placing all unmaked nodes in availale pool of stoage Polems:. slow when memoy is almost full. invalid infomation in pointe fields. mak its take up space can stoe in a sepaate tale. limited amount of memoy fo gaage collection pocess to un

14 gc5 ALGORITHM Sequentially step though memoy and each time encounte a maked node p, eset the cuent node to e the minimum of the unmaked addesses in the CAR and CDR fields of p Stop when each the end of memoy pocedue ALG(low,high); egin value intege low,high; gloal addess aay m; intege i,j; i low; while i high do egin if ATOM(m[i]) o NOT(MARK(m[i])) then i i+ else egin j i+; if NOT(MARK(CAR(m[i]))) then egin MARK(CAR(m[i])) tue; if NOT(ATOM(CAR(m[i]))) then j min(j,car(m[i])); if NOT(MARK(CDR(m[i]))) then egin MARK(CDR(m[i])) tue; if NOT(ATOM(CDR(m[i]))) then j min(j,cdr(m[i])); i j; mak CAR CDR only and initially accessile; stat sequential scan at. and its CAR and CDR aleady maked; esume scan at 5 8

15 gc5 ALGORITHM Sequentially step though memoy and each time encounte a maked node p, eset the cuent node to e the minimum of the unmaked addesses in the CAR and CDR fields of p Stop when each the end of memoy pocedue ALG(low,high); egin value intege low,high; gloal addess aay m; intege i,j; i low; while i high do egin if ATOM(m[i]) o NOT(MARK(m[i])) then i i+ else egin j i+; if NOT(MARK(CAR(m[i]))) then egin MARK(CAR(m[i])) tue; if NOT(ATOM(CAR(m[i]))) then j min(j,car(m[i])); if NOT(MARK(CDR(m[i]))) then egin MARK(CDR(m[i])) tue; if NOT(ATOM(CDR(m[i]))) then j min(j,cdr(m[i])); i j; mak CAR CDR only and initially accessile; stat sequential scan at. and its CAR and CDR aleady maked; esume scan at. and CDR() ae maked while CAR() is not maked; esume scan at afte making it 5 8

16 gc5 ALGORITHM Sequentially step though memoy and each time encounte a maked node p, eset the cuent node to e the minimum of the unmaked addesses in the CAR and CDR fields of p Stop when each the end of memoy pocedue ALG(low,high); egin value intege low,high; gloal addess aay m; intege i,j; i low; while i high do egin if ATOM(m[i]) o NOT(MARK(m[i])) then i i+ else egin j i+; if NOT(MARK(CAR(m[i]))) then egin MARK(CAR(m[i])) tue; if NOT(ATOM(CAR(m[i]))) then j min(j,car(m[i])); if NOT(MARK(CDR(m[i]))) then egin MARK(CDR(m[i])) tue; if NOT(ATOM(CDR(m[i]))) then j min(j,cdr(m[i])); i j; mak CAR CDR only and initially accessile; stat sequential scan at. and its CAR and CDR aleady maked; esume scan at. and CDR() ae maked while CAR() is not maked; esume scan at afte making it. CAR() and CDR() ae aleady maked; esume scan at 5 z 8

17 gc5 ALGORITHM Sequentially step though memoy and each time encounte a maked node p, eset the cuent node to e the minimum of the unmaked addesses in the CAR and CDR fields of p Stop when each the end of memoy pocedue ALG(low,high); egin value intege low,high; gloal addess aay m; intege i,j; i low; while i high do egin if ATOM(m[i]) o NOT(MARK(m[i])) then i i+ else egin j i+; if NOT(MARK(CAR(m[i]))) then egin MARK(CAR(m[i])) tue; if NOT(ATOM(CAR(m[i]))) then j min(j,car(m[i])); if NOT(MARK(CDR(m[i]))) then egin MARK(CDR(m[i])) tue; if NOT(ATOM(CDR(m[i]))) then j min(j,cdr(m[i])); i j; mak CAR CDR only and initially accessile; stat sequential scan at. and its CAR and CDR aleady maked; esume scan at. and CDR() ae maked while CAR() is not maked; esume scan at afte making it. CAR() and CDR() ae aleady maked; esume scan at 5. and its CAR and CDR fields ae aleady maked; esume scan at 5 which is unmaked; eit 5 g z 8

18 gc5 ALGORITHM Sequentially step though memoy and each time encounte a maked node p, eset the cuent node to e the minimum of the unmaked addesses in the CAR and CDR fields of p Stop when each the end of memoy pocedue ALG(low,high); egin value intege low,high; gloal addess aay m; intege i,j; i low; while i high do egin if ATOM(m[i]) o NOT(MARK(m[i])) then i i+ else egin j i+; if NOT(MARK(CAR(m[i]))) then egin MARK(CAR(m[i])) tue; if NOT(ATOM(CAR(m[i]))) then j min(j,car(m[i])); if NOT(MARK(CDR(m[i]))) then egin MARK(CDR(m[i])) tue; if NOT(ATOM(CDR(m[i]))) then j min(j,cdr(m[i])); i j; mak CAR CDR only and initially accessile; stat sequential scan at. and its CAR and CDR aleady maked; esume scan at. and CDR() ae maked while CAR() is not maked; esume scan at afte making it. CAR() and CDR() ae aleady maked; esume scan at 5. and its CAR and CDR fields ae aleady maked; esume scan at 5 which is unmaked; eit Algoithm is slow O(m n) fo m cells in memoy and n maked cells 5 5 v g z 8

19 ALGORITHM 8 gc6 Use a stack to keep tack of cells to e maked. mak all immediately accessile cells and ente them in stack. emove enties fom stack and fo each one that is not an atom, mak its CAR and CDR fields and ente them on the stack if they have not een peviously maked. teminate when the stack is empty mak CAR CDR stack:. initially, only and ae accessile and enteed on the stack 5

20 ALGORITHM 8 gc6 Use a stack to keep tack of cells to e maked. mak all immediately accessile cells and ente them in stack. emove enties fom stack and fo each one that is not an atom, mak its CAR and CDR fields and ente them on the stack if they have not een peviously maked. teminate when the stack is empty mak CAR CDR stack:. initially, only and ae accessile and enteed on the stack. emove fom the stack; ente CAR()= on the stack and mak it 5

21 ALGORITHM z 8 gc6 Use a stack to keep tack of cells to e maked. mak all immediately accessile cells and ente them in stack. emove enties fom stack and fo each one that is not an atom, mak its CAR and CDR fields and ente them on the stack if they have not een peviously maked. teminate when the stack is empty mak CAR CDR stack:. initially, only and ae accessile and enteed on the stack. emove fom the stack; ente CAR()= on the stack and mak it. emove fom the stack; oth CAR() and CDR() have aleady een maked 5

22 ALGORITHM g z 8 gc6 Use a stack to keep tack of cells to e maked. mak all immediately accessile cells and ente them in stack. emove enties fom stack and fo each one that is not an atom, mak its CAR and CDR fields and ente them on the stack if they have not een peviously maked. teminate when the stack is empty mak CAR CDR stack: -. initially, only and ae accessile and enteed on the stack. emove fom the stack; ente CAR()= on the stack and mak it. emove fom the stack; oth CAR() and CDR() have aleady een maked. emove fom the stack; oth CAR() and CDR() have aleady een maked; stack is empty and finished 5

23 ALGORITHM 5 v g z 8 gc6 Use a stack to keep tack of cells to e maked. mak all immediately accessile cells and ente them in stack. emove enties fom stack and fo each one that is not an atom, mak its CAR and CDR fields and ente them on the stack if they have not een peviously maked. teminate when the stack is empty mak CAR CDR stack:. initially, only and ae accessile and enteed on the stack. emove fom the stack; ente CAR()= on the stack and mak it. emove fom the stack; oth CAR() and CDR() have aleady een maked. emove fom the stack; oth CAR() and CDR() have aleady een maked; stack is empty and finished - Time popotional to nume of cells that ae maked Dawacks. whee to stoe the stack? little memoy availale at time gaage collection is invoked. not inconceivale to un out of stack space when unning algoithm 5

24 ALGORITHM 8 gc7 Avoids use of stack in Algoithm y eusing the CAR and CDR fields to simulate the stack Requies additional one-it DOING_CAR field fo each non-atomic cell p to indicate whethe the cell cuently eing pocessed is pointed at y CAR(p) o CDR(p) DOING_CAR is useful in detecting if oth CAR and CDR of p have een gaage-collected Disadvantages: cannot eecute in paallel with application pogam CAR CDR DOING_CAR top_stack p: 0

25 ALGORITHM 8 gc7 Avoids use of stack in Algoithm y eusing the CAR and CDR fields to simulate the stack Requies additional one-it DOING_CAR field fo each non-atomic cell p to indicate whethe the cell cuently eing pocessed is pointed at y CAR(p) o CDR(p) DOING_CAR is useful in detecting if oth CAR and CDR of p have een gaage-collected Disadvantages: cannot eecute in paallel with application pogam CAR CDR DOING_CAR p: top_stack top_stack p: 0. visiting p fo fist time (assume CAR(p) is not maked) set DOING_CAR to tue set CAR(p) to pedecesso (TOP_STACK) set TOP_STACK to p set p to old value of CAR(p) continue pocessing p

26 ALGORITHM z 8 gc7 Avoids use of stack in Algoithm y eusing the CAR and CDR fields to simulate the stack Requies additional one-it DOING_CAR field fo each non-atomic cell p to indicate whethe the cell cuently eing pocessed is pointed at y CAR(p) o CDR(p) DOING_CAR is useful in detecting if oth CAR and CDR of p have een gaage-collected Disadvantages: cannot eecute in paallel with application pogam CAR CDR DOING_CAR top_stack p: s: top_stack top_stack p:. visiting p fo fist time (assume CAR(p) is not maked) set DOING_CAR to tue set CAR(p) to pedecesso (TOP_STACK) set TOP_STACK to p set p to old value of CAR(p) continue pocessing p. visiting p fo second time (etuning fom s) eset CAR(p) to s set TOP_STACK to pevious value of CAR(p) 0

27 ALGORITHM g z 8 gc7 Avoids use of stack in Algoithm y eusing the CAR and CDR fields to simulate the stack Requies additional one-it DOING_CAR field fo each non-atomic cell p to indicate whethe the cell cuently eing pocessed is pointed at y CAR(p) o CDR(p) DOING_CAR is useful in detecting if oth CAR and CDR of p have een gaage-collected Disadvantages: cannot eecute in paallel with application pogam CAR CDR DOING_CAR top_stack top_stack top_stack p: 0 0 top_stack p: s: :. visiting p fo fist time (assume CAR(p) is not maked) set DOING_CAR to tue set CAR(p) to pedecesso (TOP_STACK) set TOP_STACK to p set p to old value of CAR(p) continue pocessing p. visiting p fo second time (etuning fom s) eset CAR(p) to s set TOP_STACK to pevious value of CAR(p) if =CDR(p) is not maked then a. mak. set CDR(p) to pevious TOP_STACK value c. set TOP_STACK to p d. set DOING_CAR to false e. continue pocessing

28 ALGORITHM 5 v g z 8 gc7 Avoids use of stack in Algoithm y eusing the CAR and CDR fields to simulate the stack Requies additional one-it DOING_CAR field fo each non-atomic cell p to indicate whethe the cell cuently eing pocessed is pointed at y CAR(p) o CDR(p) DOING_CAR is useful in detecting if oth CAR and CDR of p have een gaage-collected Disadvantages: cannot eecute in paallel with application pogam CAR CDR DOING_CAR top_stack top_stack top_stack top_stack p: 0 0 top_stack p: s: : s:. visiting p fo fist time (assume CAR(p) is not maked) set DOING_CAR to tue set CAR(p) to pedecesso (TOP_STACK) set TOP_STACK to p set p to old value of CAR(p) continue pocessing p. visiting p fo second time (etuning fom s) eset CAR(p) to s set TOP_STACK to pevious value of CAR(p) if =CDR(p) is not maked then a. mak. set CDR(p) to pevious TOP_STACK value c. set TOP_STACK to p d. set DOING_CAR to false e. continue pocessing. visiting p fo thid time (etuning fom s) eset CDR(p) to s set TOP_STACK to pevious value of CDR(p) continue unwinding

29 STOP-AND-COPY GARBAGE COLLECTION gc8 Polems with sweep phase of mak-and-sweep paadigm:. must eamine each memoy location to see if maked. inefficient if most locations wee maked as will need to einvoke pocess soon poaly pefeale to incease size of FREE aea. also inefficient if few ae maked (i.e., most ae inaccessile) may e cheape to copy contents of maked ones while making in which case emaining stoage is availale fo allocation Altenative is to use stop-and-copy paadigm. motivation is that most locations ae inaccessile cheape to copy accessile while making instead of making followed y a sweep though all of memoy which includes the inaccessile as well. patition memoy into aeas: copied-fom and copied-to only one aea is eve in use. algoithm: when stoage is ehausted in the aea in-use (copied-fom) identify the accessile locations in it and in the pocess copy them to the othe aea (copied-to) continue eecution with all susequent allocation fom the unoccupied locations in copied-to copied-fom will seve as the copied-to aea the net time stoage is ehausted pocess continues with oles of two aeas intechanged. dawacks: need to e caeful so pointes ae coect if shaing is pemitted one half of memoy is not in use

30 GENERATIONAL SCAVENGING gc9 In tems of ojects athe than locations Focus on age (time since initial allocation of oject) Basic pemises (acked y empiical osevations). young ojects die at a faste ate than old ojects. old ojects usually efe to old ojects Implications:. stoage eclamation should focus on young ojects and not waste time on old ojects. since so many young ojects die, it is cheape to copy the suviving ones than to sweep though the copses Two types of gaage collection. vaiant of stop-and-copy (scavenging) vey often. mak-and-sweep less often Memoy patitioned into fou aeas (temed spaces):. NewSpace: new ojects allocated fom hee. PastSuvivoSpace: like copied-fom. FutueSuvivoSpace: like copied-to. OldSpace: suvivied moe than s scavenges Teminology ationale:. scavenge: only eamine most pomising pat of stoage. geneation: don t othe to scavenge when gown up (tenued)

31 MECHANICS OF GENERATIONAL SCAVENGING gc0 Stat with immediately accessile ojects Scavenge at egula intevals o when NewSpace is ehausted. only mak accessile ojects in NewSpace and PastSuvivoSpace and copy to FutueSuvivoSpace apply ecusively. tenue ojects (move into OldSpace) if they have suvived moe than s scavenges (moves fom PastSuvivoSpace to FutueSuvivoSpace). do not pusue pointes to ojects in OldSpace Inaccessile old ojects ae collected y applying mak-and-sweep algoithm to entie memoy. OldSpace. YoungSpace = { NewSpace,PastSuvivoSpace, FutueSuvivoSpace} Rememeed set contains ojects in OldSpace that point to ojects in YoungSpace Time compleity: nume of suviving ojects (including those accessile fom the ememeed set) Space compleity:. it pe oject to indicate if moved fom PastSuvivoSpace to FutueSuvivoSpace. countes fo tenuing

32 MECHANICS OF REMEMBERED SET R gc Ojects added when:. assignment opeation esults in an oject in OldSpace pointing to an oject in YoungSpace (e.g., RPLACA and RPLACD in LISP). oject eing tenued points to an oject in YoungSpace All ojects p pointed at y oject o in R ae scavenged:. if p points to OldSpace, then leave p alone. if p efeences YoungSpace, then: if p aleady moved to f in FutueSuvivoSpace o OldSpace, then update pointe in o to point to f instead of to p if p has not een moved aleady, then: a. move p to f in eithe FutueSuvivoSpace o OldSpace, depending on p's age. eplace contents of p y a pointe to f c. update pointe in o to efe to f instead of p. if afte scavenge update, all ojects p pointed y o ae in OldSpace, then emove o fom R Recusively pocess (scavenge) all ojects moved to FutueSuvivoSpace, OldSpace, and the ememeed set

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc - CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

GCC-AVR Inline Assembler Cookbook Version 1.2

GCC-AVR Inline Assembler Cookbook Version 1.2 GCC-AVR Inline Assemble Cookbook Vesion 1.2 About this Document The GNU C compile fo Atmel AVR isk pocessos offes, to embed assembly language code into C pogams. This cool featue may be used fo manually

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

Computer Science 141 Computing Hardware

Computer Science 141 Computing Hardware Compute Science 141 Computing Hadwae Fall 2006 Havad Univesity Instucto: Pof. David Books dbooks@eecs.havad.edu [MIPS Pipeline Slides adapted fom Dave Patteson s UCB CS152 slides and May Jane Iwin s CSE331/431

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

sf3 RESTRICTED QUADTREE (VON HERZEN/BARR)

sf3 RESTRICTED QUADTREE (VON HERZEN/BARR) SURFACE DATA HIERARCHICAL TRIANGULAR DECOMPOSITION Appoximate suface S y plana tiangula patches whose vetices ae a suset of data points defining S Fo each patch, compute an appoximation eo. maximum eo

More information

Lecture #22 Pipelining II, Cache I

Lecture #22 Pipelining II, Cache I inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html

More information

How many times is the loop executed? middle = (left+right)/2; if (value == arr[middle]) return true;

How many times is the loop executed? middle = (left+right)/2; if (value == arr[middle]) return true; This lectue Complexity o binay seach Answes to inomal execise Abstact data types Stacks ueues ADTs, Stacks, ueues 1 binayseach(int[] a, int value) { while (ight >= let) { { i (value < a[middle]) ight =

More information

User Visible Registers. CPU Structure and Function Ch 11. General CPU Organization (4) Control and Status Registers (5) Register Organisation (4)

User Visible Registers. CPU Structure and Function Ch 11. General CPU Organization (4) Control and Status Registers (5) Register Organisation (4) PU Stuctue and Function h Geneal Oganisation Registes Instuction ycle Pipelining anch Pediction Inteupts Use Visible Registes Vaies fom one achitectue to anothe Geneal pupose egiste (GPR) ata, addess,

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability

More information

The Java Virtual Machine. Compiler construction The structure of a frame. JVM stacks. Lecture 2

The Java Virtual Machine. Compiler construction The structure of a frame. JVM stacks. Lecture 2 Compile constuction 2009 Lectue 2 Code geneation 1: Geneating code The Java Vitual Machine Data types Pimitive types, including intege and floating-point types of vaious sizes and the boolean type. The

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

This lecture. Abstract Data Types (ADTs) The Stack ADT ( 4.2) Stacks. Stack Interface in Java. Exceptions. Abstract data types Stacks Queues

This lecture. Abstract Data Types (ADTs) The Stack ADT ( 4.2) Stacks. Stack Interface in Java. Exceptions. Abstract data types Stacks Queues This lectue Abstact data types Stacks ueues Abstact Data Types (ADTs) An abstact data type (ADT) is an abstaction o a data stuctue An ADT speciies: Data stoed Opeations on the data Eo conditions associated

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Output Primitives. Ellipse Drawing

Output Primitives. Ellipse Drawing Output Pimitives Ellipse Dawing Ellipses. An ellipses is an elongated cicle and can be dawn with modified cicle dawing algoithm.. An ellipse has set of fied points (foci) that will have a constant total

More information

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994. The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

You Are Here! Review: Hazards. Agenda. Agenda. Review: Load / Branch Delay Slots 7/28/2011

You Are Here! Review: Hazards. Agenda. Agenda. Review: Load / Branch Delay Slots 7/28/2011 CS 61C: Geat Ideas in Compute Achitectue (Machine Stuctues) Instuction Level Paallelism: Multiple Instuction Issue Guest Lectue: Justin Hsia Softwae Paallel Requests Assigned to compute e.g., Seach Katz

More information

SORTING IN SPACE HANAN SAMET

SORTING IN SPACE HANAN SAMET SORTING IN SPACE HANAN SAMET COMPUTER SCIENCE DEPARTMENT AND CENTER FOR AUTOMATION RESEARCH AND INSTITUTE FOR ADVANCED COMPUTER STUDIES UNIVERSITY OF MARYLAND COLLEGE PARK, MARYLAND 074-4 USA e mail: hjs@cs.umd.edu

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18 Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context. An Improved Equivalence Algorithm

UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context. An Improved Equivalence Algorithm Disjoint-sets data type Lectue slides by Kevin Wayne Copyight 5 Peason-Addison Wesley http://www.cs.pinceton.edu/~wayne/kleinbeg-tados UNION FIND naïve linking link-by-size link-by-ank path compession

More information

In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions.

In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. In ode to lean which questions have been answeed coectly: 1. Pint these pages. 2. Answe the questions. 3. Send this assessment with the answes via: a. FAX to (212) 967-3498. O b. Mail the answes to the

More information

All lengths in meters. E = = 7800 kg/m 3

All lengths in meters. E = = 7800 kg/m 3 Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee

More information

1 N-Queen Problem as a CSP (23 points + 5 bonus)

1 N-Queen Problem as a CSP (23 points + 5 bonus) Spin Semeste, 2011 CSCE 421/821: Foundations of Constaint Pocessin B.Y. Chouei Homewok 4 Assined: Monda, Fe 28, 2011 Due: Monda, Ma 7, 2011 Total value: 100 points (+ 5 onus points). Penalt of 20 points

More information

Introduction To Pipelining. Chapter Pipelining1 1

Introduction To Pipelining. Chapter Pipelining1 1 Intoduction To Pipelining Chapte 6.1 - Pipelining1 1 Mooe s Law Mooe s Law says that the numbe of pocessos on a chip doubles about evey 18 months. Given the data on the following two slides, is this tue?

More information

CS 450: COMPUTER GRAPHICS RASTERIZING CONICS SPRING 2016 DR. MICHAEL J. REALE

CS 450: COMPUTER GRAPHICS RASTERIZING CONICS SPRING 2016 DR. MICHAEL J. REALE CS 45: COMPUTER GRAPHICS RASTERIZING CONICS SPRING 6 DR. MICHAEL J. REALE RASTERIZING CURVES OTHER THAN LINES When dealing with othe inds of cuves, we can daw it in one of the following was: Use elicit

More information

The Processor: Improving Performance Data Hazards

The Processor: Improving Performance Data Hazards The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Monitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next?

Monitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next? Monitos Lectue 6 Monitos Summay: Last time A combination of data abstaction and mutual exclusion Automatic mutex Pogammed conditional synchonisation Widely used in concuent pogamming languages and libaies

More information

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons.

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons. Counting Convex Polygons in Plana Point Sets Joseph S. B. Mitchell a;1, Günte Rote b, Gopalakishnan Sundaam c, and Gehad Woeginge b a Applied Mathematics and Statistics, SUNY Stony Book, NY 11794-3600.

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

User Specified non-bonded potentials in gromacs

User Specified non-bonded potentials in gromacs Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of

More information

Strongly Connected Components. Uses for SCC s. Two Simple SCC Algorithms. Directed Acyclic Graphs

Strongly Connected Components. Uses for SCC s. Two Simple SCC Algorithms. Directed Acyclic Graphs CSE Intoduction to Algoithms Depth Fist Seach and Stongly Connected Components W.L. Ruzzo, Summe 00 Undiected Depth-Fist Seach It s not just fo tees DFS() back edge tee edge if maked then etun; mak ; #

More information

Computer Architecture. Pipelining and Instruction Level Parallelism An Introduction. Outline of This Lecture

Computer Architecture. Pipelining and Instruction Level Parallelism An Introduction. Outline of This Lecture Compute Achitectue Pipelining and nstuction Level Paallelism An ntoduction Adapted fom COD2e by Hennessy & Patteson Slide 1 Outline of This Lectue ntoduction to the Concept of Pipelined Pocesso Pipelined

More information

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia CS 61C: Geat Ideas in Compute Achitectue Pipelining Hazads Instucto: Senio Lectue SOE Dan Gacia 1 Geat Idea #4: Paallelism So9wae Paallel Requests Assigned to compute e.g. seach Gacia Paallel Theads Assigned

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Class 21. N -body Techniques, Part 4

Class 21. N -body Techniques, Part 4 Class. N -body Techniques, Pat Tee Codes Efficiency can be inceased by gouping paticles togethe: Neaest paticles exet geatest foces diect summation. Distant paticles exet smallest foces teat in goups.

More information

Undecidability of Static Analysis. William Landi. Siemens Corporate Research Inc. 755 College Rd East.

Undecidability of Static Analysis. William Landi. Siemens Corporate Research Inc. 755 College Rd East. Undecidability of Static Analysis William Landi Siemens Copoate Reseach Inc 755 College Rd East Pinceton, NJ 08540 wlandi@sc.siemens.com Abstact Static Analysis of pogams is indispensable to any softwae

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann.

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann. A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Pesonification by Boulic, Thalmann and Thalmann. Mashall Badley National Cente fo Physical Acoustics Univesity of

More information

MIS to Prepress ICS. Version Date: File: ICS-MIS-Prepress-1.01.doc,.pdf. Origination & Prepress WG

MIS to Prepress ICS. Version Date: File: ICS-MIS-Prepress-1.01.doc,.pdf. Origination & Prepress WG MIS to Pepess ICS Vesion 1.01 Date: 2006-01-02 File: ICS-MIS-Pepess-1.01.doc,.pdf Oigination & Pepess WG Abstact This ICS defines the Inteface between the MIS and Pepess. It specifies the Pocesses fo a

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

CISC 662 Graduate Computer Architecture Lecture 6 - Hazards

CISC 662 Graduate Computer Architecture Lecture 6 - Hazards CISC 662 Gaduate Compute Achitectue Lectue 6 - Hazads Michela Taufe http://www.cis.udel.edu/~taufe/teaching/cis662f07 Powepoint Lectue Notes fom John Hennessy and David Patteson s: Compute Achitectue,

More information

CENG 3420 Computer Organization and Design. Lecture 07: MIPS Processor - II. Bei Yu

CENG 3420 Computer Organization and Design. Lecture 07: MIPS Processor - II. Bei Yu CENG 3420 Compute Oganization and Design Lectue 07: MIPS Pocesso - II Bei Yu CEG3420 L07.1 Sping 2016 Review: Instuction Citical Paths q Calculate cycle time assuming negligible delays (fo muxes, contol

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

University of Waterloo CS240 Winter 2018 Assignment 4 Due Date: Wednesday, Mar. 14th, at 5pm

University of Waterloo CS240 Winter 2018 Assignment 4 Due Date: Wednesday, Mar. 14th, at 5pm Univesit of Wateloo CS Winte Assinment Due Date: Wednesda, Ma. th, at pm vesion: -- : Please ead the uidelines on sumissions: http://.student.cs.uateloo.ca/ ~cs//uidelines.pdf. This assinment contains

More information

CS 2461: Computer Architecture 1 Program performance and High Performance Processors

CS 2461: Computer Architecture 1 Program performance and High Performance Processors Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks

More information

IS-IS Protocol Hardware Implementation for VPN Solutions

IS-IS Protocol Hardware Implementation for VPN Solutions IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

A Consistent, User Friendly Interface for Running a Variety of Underwater Acoustic Propagation Codes

A Consistent, User Friendly Interface for Running a Variety of Underwater Acoustic Propagation Codes Poceedings of ACOUSTICS 6 - Novembe 6, Chistchuch, New Zealand A Consistent, Use Fiendly Inteface fo Running a Vaiety of Undewate Acoustic Popagation Codes Alec J Duncan, Amos L Maggi Cente fo Maine Science

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation

More information

10/29/2010. Rendering techniques. Global Illumination. Local Illumination methods. Today : Global Illumination Modules and Methods

10/29/2010. Rendering techniques. Global Illumination. Local Illumination methods. Today : Global Illumination Modules and Methods Rendeing techniques Compute Gaphics Lectue 10 Can be classified as Local Illumination techniques Global Illumination techniques Global Illumination 1: Ray Tacing and Radiosity Taku Komua 1 Local Illumination

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

Monte Carlo Techniques for Rendering

Monte Carlo Techniques for Rendering Monte Calo Techniques fo Rendeing CS 517 Fall 2002 Compute Science Conell Univesity Announcements No ectue on Thusday Instead, attend Steven Gotle, Havad Upson Hall B17, 4:15-5:15 (efeshments ealie) Geomety

More information

CS 61C: Great Ideas in Computer Architecture (Machine Structures) Instruc>on Level Parallelism

CS 61C: Great Ideas in Computer Architecture (Machine Structures) Instruc>on Level Parallelism Agenda CS 61C: Geat Ideas in Compute Achitectue (Machine Stuctues) Instuc>on Level Paallelism Instuctos: Randy H. Katz David A. PaJeson hjp://inst.eecs.bekeley.edu/~cs61c/fa10 Review Instuc>on Set Design

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

1 N-Queen Problem as a CSP (23 points + 5 bonus)

1 N-Queen Problem as a CSP (23 points + 5 bonus) Fall Semeste, 2014 CSCE 421/821: Foundations of Constaint Pocessin B.Y. Chouei Homewok 5 Assined: Wednesda, Octoe 29th, 2014 Due: Wednesda, Nov 12th, 2014 (Wednesda, Nov 5th, 2014 poess epot due). Total

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Exploring non-typical memcache architectures for decreased latency and distributed network usage.

Exploring non-typical memcache architectures for decreased latency and distributed network usage. Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted

More information

Topic 7 Random Variables and Distribution Functions

Topic 7 Random Variables and Distribution Functions Definition of a Random Vaiable Distibution Functions Popeties of Distibution Functions Topic 7 Random Vaiables and Distibution Functions Distibution Functions 1 / 11 Definition of a Random Vaiable Distibution

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

CMCS Mohamed Younis CMCS 611, Advanced Computer Architecture 1

CMCS Mohamed Younis CMCS 611, Advanced Computer Architecture 1 CMCS 611-101 Advanced Compute Achitectue Lectue 6 Intoduction to Pipelining Septembe 23, 2009 www.csee.umbc.edu/~younis/cmsc611/cmsc611.htm Mohamed Younis CMCS 611, Advanced Compute Achitectue 1 Pevious

More information

Dense pointclouds from combined nadir and oblique imagery by object-based semi-global multi-image matching

Dense pointclouds from combined nadir and oblique imagery by object-based semi-global multi-image matching Dense pointclouds fom combined nadi and oblique imagey by object-based semi-global multi-image matching Y X Thomas Luhmann, Folkma Bethmann & Heidi Hastedt Jade Univesity of Applied Sciences, Oldenbug,

More information

Undirected Depth-First Search. CSE 421 Introduction to Algorithms. Undirected Depth-First Search. Directed Depth First Search

Undirected Depth-First Search. CSE 421 Introduction to Algorithms. Undirected Depth-First Search. Directed Depth First Search CSE Intoduction to Algoithms Undiected Depth-Fist Seach It s not just fo tees Depth Fist Seach and Stongly Connected Components DFS() back edge tee edge if maked then etun; mak ; # := ++count; fo all edges

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

The Screen Control Language (SCl) in Version 6 SAS/Ar: and SAS/FSp Software Chris Bailey, Yao Chen SAS Institute Inc., Cary, NC

The Screen Control Language (SCl) in Version 6 SAS/Ar: and SAS/FSp Software Chris Bailey, Yao Chen SAS Institute Inc., Cary, NC The Sceen Contol Language (SCl) in Vesion 6 SAS/A: and SAS/FSp Softwae Chis Bailey, Yao Chen SAS Institute Inc., Cay, NC Abstact Explanations and examples povide the basis of this tutoial that explains

More information

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3 A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

CENG 3420 Lecture 07: Pipeline

CENG 3420 Lecture 07: Pipeline CENG 3420 Lectue 07: Pipeline Bei Yu byu@cse.cuhk.edu.hk CENG3420 L07.1 Sping 2017 Outline q Review: Flip-Flop Contol Signals q Pipeline Motivations q Pipeline Hazads q Exceptions CENG3420 L07.2 Sping

More information