A Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division

Size: px
Start display at page:

Download "A Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division"

Transcription

1 A Formal Moel an Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Stanar Floating Point Division Davi W. Matula, Lee D. McFearin Department of Computer Science an Engineering Southern Methoist University Dallas, TX {matula,mcfearin}@engr.smu.eu Abstract We utilize a formal moel of ivision for etermining a testbench of pbit (ivien, ivisor) pairs whose output 2pbit quotients have properties characterizing these instances as the most challenging for verifying any ivision algorithm esign an implementation. Specifically, our test suites yiel 2pbit quotients where the leaing pbits traverse all or a pseuoranom sample of leaing bit combinations, an the next pbits comprise a roun bit followe by (p1) ientical bits. These values are pro ven to be closest to the pbit quotient rouning bounaries an shown to possess other esirable coverage properties. We introuce an efficient metho of generating these testbenches. We also escribe applications of these testbenches at the esign simulation stage an the prouct evaluation stage. 1. Introuction The IEEE floating point stanar [IEEE] requires all conforming implementations of ivision an square root to correctly roun the result as if the infinitely precise result ha been calculate an then roune to the target precision. As processors become larger an these implementations become more complex, the chances for expensive flaws increase [SB94]. Single precision unary functions such as square root an square root reciprocal have only 16 million istinct inputs an may be exhaustively teste. However, ivision has two arguments generating 64 trillion istinct normalize single precision input cases, an almost a quintillion times as many istinct ouble precision input cases. Since ivision can not be exhaustively teste in a reasonable amount of time, selective, statistical test suites are typically use for verification. One such type of test suite focuses on those instances which yiel infinitely precise quotients extremely close to the rouning bounaries[ka87,pa99, MM02, MM03]. These instances are the most sensitive to calculation errors as a very small approximation error may cause the result to cross a rouning bounary an roun incorrectly. Note that the problem of etermining extremal rouning bounary cases for transcenentals has no known conveniently scalable solution for higher precisions an has been terme the "table maker s ilemma" [Mu97,LM98,LM04,Zi91,DE05]. While a boy of excellent research on search techniques has evolve for fining extremal "haresttoroun" cases for ouble precision an some ouble extene precision transcenental functions, it appears to be very har to obtain a general characterization. In contrast, the problem of etermining extremal rouning bounary cases for ivision has a firm number theoretic founation that is conveniently scalable to higher precisions. Our solution herein improves the efficiency of generating benchmark sets for this problem an is instructive in that it comprises funamental elementary results from three istinct number types as follows. i. Raix Arithmetic: the problem of etermining extremal rouning bounary cases for floating point ivision is initially cast as a problem with binary raix floating point inputs an outputs. ii. Rational Arithmetic: The extremal rouning bounary cases are recharacterize employing rational arithmetic where Farey fractions an continue fractions conveniently ientify the esire extremal cases. iii. Resiue Arithmetic: The core computational steps are simplifie by utilizing properties of the multiplicative inverse moulo 2 k. This is the principle aition herein to our previously publishe methoology /DATE EDAA

2 2. Backgroun The size of a floating point ivision operation is characterize by the size of the significan of the arguments. A positive p bit number is a binary rational of the form 2 e i, where 1 i 2 p 1 an i is o. Thus, the precision p 1 provies a measure of the size of the pbit number s significan bit string in the normalize floating point factore format z = 2 e (1. b 1 b 2...b p 1 ). A p p bit fraction enotes a fraction n where the numerator an enominator are positive pbit inte gers[mm00,mm03]. The rational value q = n is terme the infinitely precise p p bit quotient. For our purposes herein a normalize p p bit fraction has the enominator in the range 1 2 p 1, an the numerator in the range n <2, so then the normalize p p bit quotient is in the stanar binae 1 q = n = 1. b 1b 2...< 2. Note that if this normalization yiels a numerator greater than 2 p, it must be even to be a pbit number. Following the literature on continue fractions an Farey series, two fractions are ajacent if their cross prouct is unity [HW79,MK85]. With this backgroun, the extremal rouning bounary instances of p p bit fractions n for rountonearest floating point ivision have been characterize by three istinct, an provably equivalent efinitions[mm00, MM02, MM03]: (i) [Distance form] the istance of n from a closest pbit i mipoint satisfies n 2 p i < 1. 2 p 2 2p 1 (ii) [Binary expansion form] n has the stanar binary expansion n = 1. b 1b 2...b p 1 b p... where the tail "rouning critical" b p b p+1...b 2p is either or containing the maximum length run of p 1 like value bits opposite to the roun bit b p. (iii) [Best rational approximation form] n is the best rational approximation of a pbit mipoint, an is given by the closest continue fraction convergent to a pbit mipoint i. 2 p The set of p p bit fractions equivalently efine by these characterizations for a given p is enote by RN p. For example, the set RN 5 of extremal mipoint rouning bounary 5 5 bit fractions has ten members an can be evelope employing the multiplicative inv erse as illustrate in Table 1. For any o integer a with 1 a 31, let a 1 be the unique o integer with 1 a 1 31 an aa 1 1 (mo ). Traversing the rows for a = 1, 3, 5,..., 31 in Table 1, the fractions +a traverse the mipoints of the five bit intervals [ i 16, i+1 ) for 16 i Let n an be etermine by ( + a)a 1 = n + 1 an ( + a)( a 1 )= 1. This assures that +a = 1 an +a a 1 a 1 a 1 ( a 1 ). Then n a 1 = 1 RN 5 when 1 a 1 15 an is a 5 bit number (i.e. either < or is even). Similarly n RN a 1 5 when a 1 31 an n is a 5 bit number. a n +a a a 1 Extremal Value Table 1: 5 5 bit Extremal Mipoint Rouning Bounary Instances 3. Enumeration of Extremal Rouning Bounary Instances For any precision p 2, the set of extremal mipoint rouning bounary p p bit fractions can be etermine as follows. Observation 1 Let a be a pbit o integer an a 1 its p bit multiplicative inverse. Then (i) if 2 p a 1 2 p 1 let n = (2 p +a)a p. If n is even

3 or n <2 p, then n RN a 1 p, (ii) if 1 a 1 2 p 1 1 let = (2 p +a)(2 p a 1 )+1. If is 2 p even or <2 p, then RN 2 p a 1 p. Note that the multiplicative inv erse pairs a, a 1 are istinct o value pairs except for the four cases a = 1, 2 p 1 1, 2 p 1 + 1, an 2 p 1, where a is its own multiplicative inv erse. Once a multiplicative inv erse pair a,a 1 is ientifie, n or may be calculate via multiplication giving an extremal instance in most cases. On average 11 total extremal rouning bounary instances for rountonearest an irecte rouning may be calculate from n (or ) using aition via the symmetric properties iscusse in a 1 2 p a 1 [MM01] an emonstrate in Example 1. Example 1 Given a multiplicative inverse pair moulo (a k, a 1 k ) = (3, 11), the multiplication step escribe earlier, prouces =23. From Observation 1, n = 23 a 1 RN 40 p. Furthermore, from [MM01],, 22 19, 38 27, RN p, an 25, 38, 25 19, 27, 19 RD p. After the multiplicative inv erse pair a, a 1 an n (or n 1 ) has been etermine, the computational cost for each group of extremal rouning bounary instances as foun in Example 1 is 22 aitions. Past approaches have generate these multiplicative inv erse pairs by using the Eucliean GCD Algorithm for each pair. The key to the creation of an efficient algorithm base on Observation 1 lies in the systematic moular generation of the 2 p multiplicative inv erse pairs. Observation 2 For p 3, let a k 3 k (mo 2 p ) an a 1 k 3 2p 2 k (mo 2 p ) be stanar resiues moulo 2 p for k = 0, 1, 2,..., 2 p 3. Then the 2 p multiplicative inverse pairs (a k, a k 1) an (2 p a k, 2 p a k 1) for 0 k 2 p 3 contain all 2 p 1 o integers in [1, 2 p 1]. Tables 2 an 3 illustrate the use of exponential resiues 3 k (mo2 p ) in generating the multiplicative inverse pairs a, a 1 for p = 5 employing Observation 2. Exponential Resiues k 3 k (mo) 3 8 k (mo) Table 2: The 10 multiplicative inv erse resiues moulo. Multiplicative Inv erse Pairs k (a k, a 1 k ) ( a k, a k ) 0 (1, 1) (31, 31) 1 (3, 11) (29, ) 2 (9, 25) (23, 7) 3 (27, 19) (5, 13) 4 (, ) (15, 15) Table 3: The 10 multiplicative inv erse pairs moulo. This metho requires only a multiplication with two shiftana operations for etermining a multiplicative inverse pair along with an n or. Using this computational cost along with the cost of fining the symmetries in [MM01] an average cost can be etermine. Lemma 1 The average cost of 11 extremal rouning bounary instances is 1 multiplication an 24 aitions proviing a cost of slightly over 2 aitions per extremal rouning bounary instance. Using Observation 2, we may etermine all the extremal rouning bounary instances for p p bit binary floating point ivision. The following steps outline the process. Create a storage array containing 2 p 3 elements for a 3 k (mo2 p ) as ARRAY; an a similar array for a p 3 k (mo2 p ) as INV_ARRAY. Compute ARRAY[1] as 3 k (mo 2 p ), where k is the starting value, possibly 1. Compute ARRAY[n + 1] = 3 ARRAY[n] (mo 2 p ). Note this can be compute as ARRAY[n + 1] = (AR RAY[n] + (ARRAY[n] << 1)) (mo 2 p ) where << is a binary shift operation. The last element of ARRAY is the last element of INV_ARRAY.

4 Compute INV_ARRAY[n 1] = 3 INV_ARRAY[n] (mo 2 p ). Once ARRAY an INV_ARRAY hav e been compute, each ARRAY[m] an INV_ARRAY[m] represent an a, a 1 pair. Aitionally 2 p a, 2 p a 1 is a secon pair. Note that the full set of 2 p multiplictive inv erse pairs can be generate employing only 2 p 2 shiftana operations an 2 p complement operations. The complement operation is a 1 s complement since the values are o integers. With at least one of these complementary pairs, extremal rouning bounary instances can be calculate with a multiplication as mentione in Observation 1. Using all k as iscusse in Observation 2 generates the entire set RN p. The benchmark set RN 24 for testing IEEE stanar single precision ivision implementations is enumerate an available at the site [MM04]. Using this proceure the number of extremal mipoint rouning bounary cases RN p was compute for 3 p 28 an is shown in Table 4. p RN p p RN p Table 4: Number of Extremal Mipoint Rouning Bounary Cases for Precisions 3 to 28 To compute a psueo ranom subset of RN p with this metho, a subsequence of the enumeration may be selecte at ranom. Specifically, a first element may be picke at ranom for ARRAY an the "turning point" last element of INV_ARRAY may be obtaine with the extene Eucliean algorithm from the "turning point" last element of ARRAY. It is possible to avoi the nee for the Eucliean algorithm by restricting the turning points to elements a for which a 1 is computable by a single aition. Observation 3 provies a set of such multiplicative inv erse pairs that are uniformly space throughout the sequence a k, a 1 k for a 3 k (mo2 p ) as k traverses the range k = 0, 1,..., 2 p 2. Observation 3 Let j 3 an n be o satisfying 1 n 2 j+3 1. Then with a = n2 j + 1, a 1 = (2 j n)2 j j+3, we obtain that a, a 1 is a multiplicative inv erse pair moulo 2 2 j+3. IEEE stanar ouble precision has p = 53, which woul lea to multiplicative inv erse pairs in the full enumeration as given for p = 5 in Table 2. Employing Observation 3 the full sequence can be partitione into subsequences of size 2 24 pairs selectable by a 27bit ranom integer see q. Thus our enumeration proceure is initiate at a = q , an the turning point occurs after 2 23 shiftanas when a = (q ) 2 53 = q with q o. This provies a reasonable size psueo ranom sample of about 16 million multiplicative inv erse pairs using only the aition operation, which woul provie a psueo ranom subset of RN 53 of size about 22 million. 4. Applications The sets RN 24 an RD 24 along with a C++ program for generating RN p for 3 p 28 are provie by the link [MM04]. The sets RN 24 an RD 24 were evelope for an use in the esign verification stage to test the floating point ivie implementation on the one watt x86 compatible Geoe processor evelope by National Semiconuctor in 2001 an now available from AMD. The set was also employe in an afterthefact prouct evaluation stage to search for ivision implementation errors in the 1993 Pentium Processor having the well known fiv flaw [SB94]. The test suites foun the erroneous fiv quotients with a frequency much higher than that of ranom testing, surprisingly some 10,000 times (4 orers of magnitue) more frequent for single precision. For evience that fining these single precision erroneous quotients was not a fortuitous "accient", further testing showe that these istinct sets for the 15 precisions 22 p 36, uncovere the flaw at each precision at a much higher frequency than ranom testing[mm02].

5 5. Conclusions The extremal rouning bounary instances provie a natural testbench for esign verification of any implementation of IEEE stanar floating point ivision. They provie a large number of test cases, which can be calculate with relative ease. As the size of the ivision problems grow, a simple moular enumeration test suite can be carefully controlle statistically an as a sample still maintain a general coverage over the quotient, ivisor, an ivien ranges. As improve formal moels reveal more structure approaches to testing ivision, fewer flaws are likely to appear in future esigns. 6. Acknowlegments We thank Jason Moore for his assistance in the evelopment of this paper. This work was supporte in part by the Semiconuctor Research Corporation uner contract RID References [LM04] [DE05] F. e Dinechin, A. V. Ershov, an N. Gast, "Tow ars the postultimate libm," Proc. th IEEE Symposium on Computer Arithmetic. IEEE, [HW79] C. H. Hary an E. M. Wright, An Introuction to the Theory of Numbers, 5th e. Lonon, Englan: Oxfor University Press, [IEEE] IEEE Stanar 754 for Binary Floating Point Arithmetic, ANSI/IEEE Stanar No. 754, American National Stanars Institute, Washington DC, [Ka87] W. Kahan, Checking Whether Floating Point Division is Correctly Roune, monograph, April 11, 1987, (see home page [LM98] V. Lefevre, JeanMichel Muller, an A. Tisseran, "The Table Maker s Dilemma," IEEE Transactions on Computers V. Lefevre, an JeanMichel Muller "Worst cases for correct rouning of the elementary functions in ouble precision. " [MK85] D. W. Matula, P. Kornerup "Finite Precision Rational Arithmetic: Slash Number Systems." IEEE Transactions on Computers, Vol. C34 No. 1, January [MM00] D. W. Matula, L. D. McFearin "Number Theoretic Founations of Binary Floating Point Division with Rouning" Proceeings: Fourth Real Numbers an Computers, April 2000, pp [MM01] L. D. McFearin an D. W. Matula, "Generation an Analysis of Har to Roun Cases for Binary Floating Point Division." Proc. 15th IEEE Symposium on Computer Arithmetic. IEEE, pp [MM01a] L. D. McFearin an D. W. Matula, Selecting Test Suites for IEEE Stanar Floating Point Division." Proc. 19 th IEEE International Conference on Computer Design. IEEE, [MM02] L. D. McFearin, "A pbit Moel of Binary Floating Point Division an Square Root with Emphasis on Extremal Rouning Bounaries.", Ph. D. Dissertation, Southern Methoist University, Dallas, Texas, May [MM03] D. W. Matula, L. D. McFearin "A pxp Bit Fraction Moel of Binary Floating Point Division an Extremal Rouning Cases." Journal of Theoretical Computer Science, 291:159182, [MM04] D. W. Matula, See home page [Mu97] J.M. Muller, Elementary Functions, Algorithms an Implementations. Birkhauser, Boston, [Pa99] M. Parks, "Numbertheoretic Test Generation for Directe Rouning," Proc. 14th IEEE Symposium on Computer Arithmetic. IEEE, [SB94] H.P. Sharangpani, M. L. Barton, "Statistical Analysis of Floating Point Flaw in the Pentium Processor", Intel Corporation, [Zi91] A. Ziv. Fast evaluation of elementary mathematical functions with correctly roune last bit. ACM Transactions on Mathematical Software, (3):410423, Sept

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Object Recognition Using Colour, Shape and Affine Invariant Ratios

Object Recognition Using Colour, Shape and Affine Invariant Ratios Object Recognition Using Colour, Shape an Affine Invariant Ratios Paul A. Walcott Centre for Information Engineering City University, Lonon EC1V 0HB, Englan P.A.Walcott@city.ac.uk Abstract This paper escribes

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

A Convex Clustering-based Regularizer for Image Segmentation

A Convex Clustering-based Regularizer for Image Segmentation Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

Animated Surface Pasting

Animated Surface Pasting Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

A New Variant of the Barrett Algorithm Applied to Quotient Selection

A New Variant of the Barrett Algorithm Applied to Quotient Selection A New Variant of the Barrett Algorithm Applie to Quotient Selection Niall Emmart, Fangyu Zheng, Charles Weems College of Information an Computer Sciences, University of Massachusetts, Amherst, MA 13-461,

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Hybrid Position-Residues Number System

Hybrid Position-Residues Number System Hybri Position-Resiues Number System Karim Bigou, Arnau Tisseran To cite this version: Karim Bigou, Arnau Tisseran. Hybri Position-Resiues Number System. J. Hormigo; S. Oberman; N. Revol. ARITH: 3r Symposium

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology

More information

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization 272 INFORMS Journal on Computing 0899-1499 100 1204-0272 $05.00 Vol. 12, No. 4, Fall 2000 2000 INFORMS A Revise Simplex Search Proceure for Stochastic Simulation Response Surface Optimization DAVID G.

More information

Control of Scalable Wet SMA Actuator Arrays

Control of Scalable Wet SMA Actuator Arrays Proceeings of the 2005 IEEE International Conference on Robotics an Automation Barcelona, Spain, April 2005 Control of Scalable Wet SMA Actuator Arrays eslie Flemming orth Dakota State University Mechanical

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Bayesian localization microscopy reveals nanoscale podosome dynamics

Bayesian localization microscopy reveals nanoscale podosome dynamics Nature Methos Bayesian localization microscopy reveals nanoscale poosome ynamics Susan Cox, Ewar Rosten, James Monypenny, Tijana Jovanovic-Talisman, Dylan T Burnette, Jennifer Lippincott-Schwartz, Gareth

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Iterative Computation of Moment Forms for Subdivision Surfaces

Iterative Computation of Moment Forms for Subdivision Surfaces Iterative Computation of Moment Forms for Subivision Surfaces Jan P. Hakenberg ETH Zürich Ulrich Reif TU Darmstat Figure : Solis boune by Catmull-Clark an Loop subivision surfaces with centrois inicate

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Open Research Online The Open University s repository of research publications and other research outputs

Open Research Online The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications an other research outputs Geometric configuration in robot kinematic esign Book Section How to cite: Rooney, Joe (006). Geometric

More information

arxiv: v2 [math.co] 5 Jun 2018

arxiv: v2 [math.co] 5 Jun 2018 Some useful lemmas on the ege Szege inex arxiv:1805.06578v [math.co] 5 Jun 018 Shengjie He 1 1. Department of Mathematics, Beijing Jiaotong University, Beijing, 100044, China Abstract The ege Szege inex

More information

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE D CIRCULAR ULTRASONIC PHASED ARRAY S. Monal Lonon South Bank University; Engineering an Design 103 Borough Roa, Lonon

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Regularized Laplacian Zero Crossings as Optimal Edge Integrators

Regularized Laplacian Zero Crossings as Optimal Edge Integrators Regularize aplacian Zero rossings as Optimal Ege Integrators R. KIMME A.M. BRUKSTEIN Department of omputer Science Technion Israel Institute of Technology Technion ity, Haifa 32, Israel Abstract We view

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Distributed Decomposition Over Hyperspherical Domains

Distributed Decomposition Over Hyperspherical Domains Distribute Decomposition Over Hyperspherical Domains Aron Ahmaia 1, Davi Keyes 1, Davi Melville 2, Alan Rosenbluth 2, Kehan Tian 2 1 Department of Applie Physics an Applie Mathematics, Columbia University,

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

I. Introuction With the evolution of imaging technology, an increasing number of image moalities becomes available. In remote sensing, sensors are use

I. Introuction With the evolution of imaging technology, an increasing number of image moalities becomes available. In remote sensing, sensors are use A multivalue image wavelet representation base on multiscale funamental forms P. Scheuners Vision Lab, Department ofphysics, University ofantwerp, Groenenborgerlaan 7, 00 Antwerpen, Belgium Tel.: +3/3/8

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Digital Logic Design. Midterm #1

Digital Logic Design. Midterm #1 The University of Toleo f6ms_il7.fm - EECS: igital Logic esign r. Anthony. Johnson Stuent Name_ igital Logic esign Miterm # Problems Points. 3. 4 3. 6 4. Total 5 Was the eam fair? yes no 9/9/6 The University

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Impact of cache interferences on usual numerical dense loop. nests. O. Temam C. Fricker W. Jalby. University of Leiden INRIA University of Versailles

Impact of cache interferences on usual numerical dense loop. nests. O. Temam C. Fricker W. Jalby. University of Leiden INRIA University of Versailles Impact of cache interferences on usual numerical ense loop nests O. Temam C. Fricker W. Jalby University of Leien INRIA University of Versailles Niels Bohrweg 1 Domaine e Voluceau MASI 2333 CA Leien 78153

More information

Algebraic transformations of Gauss hypergeometric functions

Algebraic transformations of Gauss hypergeometric functions Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss

More information

Open Access Adaptive Image Enhancement Algorithm with Complex Background

Open Access Adaptive Image Enhancement Algorithm with Complex Background Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment

More information

CONTENT-BASED RETRIEVAL OF DEFECT IMAGES. Jukka Iivarinen and Jussi Pakkanen

CONTENT-BASED RETRIEVAL OF DEFECT IMAGES. Jukka Iivarinen and Jussi Pakkanen Proceeings of ACIVS 2002 (Avance Concepts for Intelligent Vision Systems), Ghent, Belgium, September 9-11, 2002 CONTENT-BASED RETRIEVAL OF DEFECT IMAGES Jukka Iivarinen an Jussi Pakkanen jukka.iivarinen@hut.fi,

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

A Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images

A Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images A Comparative Evaluation of Iris an Ocular Recognition Methos on Challenging Ocular Images Vishnu Naresh Boeti Carnegie Mellon University Pittsburgh, PA 523 naresh@cmu.eu Jonathon M Smereka Carnegie Mellon

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

CONSTRUCTION AND ANALYSIS OF INVERSIONS IN S 2 AND H 2. Arunima Ray. Final Paper, MATH 399. Spring 2008 ABSTRACT

CONSTRUCTION AND ANALYSIS OF INVERSIONS IN S 2 AND H 2. Arunima Ray. Final Paper, MATH 399. Spring 2008 ABSTRACT CONSTUCTION AN ANALYSIS OF INVESIONS IN S AN H Arunima ay Final Paper, MATH 399 Spring 008 ASTACT The construction use to otain inversions in two-imensional Eucliean space was moifie an applie to otain

More information

A Versatile Model-Based Visibility Measure for Geometric Primitives

A Versatile Model-Based Visibility Measure for Geometric Primitives A Versatile Moel-Base Visibility Measure for Geometric Primitives Marc M. Ellenrieer 1,LarsKrüger 1, Dirk Stößel 2, an Marc Hanheie 2 1 DaimlerChrysler AG, Research & Technology, 89013 Ulm, Germany 2 Faculty

More information

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach W. E. Dixon e-mail: wixon@ces.clemson.eu D. M. Dawson e-mail: awson@ces.clemson.eu E. Zergeroglu e-mail: ezerger@ces.clemson.eu Department of Electrical & Computer Engineering, Clemson University, Clemson,

More information

Holy Halved Heaquarters Riddler

Holy Halved Heaquarters Riddler Holy Halve Heaquarters Riler Anonymous Philosopher June 206 Laser Larry threatens to imminently zap Riler Heaquarters (which is of regular pentagonal shape with no courtyar or other funny business) with

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

A Multi-class SVM Classifier Utilizing Binary Decision Tree

A Multi-class SVM Classifier Utilizing Binary Decision Tree Informatica 33 (009) 33-41 33 A Multi-class Classifier Utilizing Binary Decision Tree Gjorgji Mazarov, Dejan Gjorgjevikj an Ivan Chorbev Department of Computer Science an Engineering Faculty of Electrical

More information

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

3D CITY REGISTRATION AND ENRICHMENT

3D CITY REGISTRATION AND ENRICHMENT 3D CITY REGISTRATION AND ENRICHMENT J. A. Quinn, P. D. Smart an C. B. Jones School of Computer Science, Cariff University {j.a.quinn, p.smart, c.b.jones}@cs.cf.ac.uk KEY WORDS: City moels, registration,

More information

How to Make E-cash with Non-Repudiation and Anonymity

How to Make E-cash with Non-Repudiation and Anonymity How to Make E-cash with Non-Repuiation an Anonymity Ronggong Song an Larry Korba Institute for Information Technology National Research Council of Canaa Ottawa, Ontario K1A 0R6, Canaa {Ronggong.Song, Larry.Korba}@nrc.ca

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Nearest Neighbor Search using Additive Binary Tree

Nearest Neighbor Search using Additive Binary Tree Nearest Neighbor Search using Aitive Binary Tree Sung-Hyuk Cha an Sargur N. Srihari Center of Excellence for Document Analysis an Recognition State University of New York at Buffalo, U. S. A. E-mail: fscha,sriharig@cear.buffalo.eu

More information

Automation of Bird Front Half Deboning Procedure: Design and Analysis

Automation of Bird Front Half Deboning Procedure: Design and Analysis Automation of Bir Front Half Deboning Proceure: Design an Analysis Debao Zhou, Jonathan Holmes, Wiley Holcombe, Kok-Meng Lee * an Gary McMurray Foo Processing echnology Division, AAS Laboratory, Georgia

More information

Blind Data Classification using Hyper-Dimensional Convex Polytopes

Blind Data Classification using Hyper-Dimensional Convex Polytopes Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way

More information

Waleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University

Waleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University Dierential I DDQ Testable Static RAM Architecture Walee K. Al-Assai Anura P. Jayasumana Yashwant K. Malaiya y Technical Report CS-96-102 February 1996 Department of Electrical Engineering/ y Department

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Controlling formations of multiple mobile robots. Jaydev P. Desai Jim Ostrowski Vijay Kumar

Controlling formations of multiple mobile robots. Jaydev P. Desai Jim Ostrowski Vijay Kumar Controlling formations of multiple mobile robots Jayev P. Desai Jim Ostrowski Vijay Kumar General Robotics an Active Sensory Perception (GRASP) Laboratory, University of Pennsylvania 340 Walnut Street,

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

Multimodal Stereo Image Registration for Pedestrian Detection

Multimodal Stereo Image Registration for Pedestrian Detection Multimoal Stereo Image Registration for Peestrian Detection Stephen Krotosky an Mohan Trivei Abstract This paper presents an approach for the registration of multimoal imagery for peestrian etection when

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Roundoff Errors and Computer Arithmetic

Roundoff Errors and Computer Arithmetic Jim Lambers Math 105A Summer Session I 2003-04 Lecture 2 Notes These notes correspond to Section 1.2 in the text. Roundoff Errors and Computer Arithmetic In computing the solution to any mathematical problem,

More information

Parts Assembly by Throwing Manipulation with a One-Joint Arm

Parts Assembly by Throwing Manipulation with a One-Joint Arm 21 IEEE/RSJ International Conference on Intelligent Robots an Systems, Taipei, Taiwan, October, 21. Parts Assembly by Throwing Manipulation with a One-Joint Arm Hieyuki Miyashita, Tasuku Yamawaki an Masahito

More information

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target .IJCSI.org 67 Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target Karim Benbouaballah an Zhu Qi-an College of Automation, Harbin Engineering University Harbin, 151, China

More information