In-place Graph Rewriting with Interaction Nets

Size: px
Start display at page:

Download "In-place Graph Rewriting with Interaction Nets"

Transcription

1 In-place Gaph Rewiting with Inteaction Nets Ian Mackie hina ato n algoithm is in-place, o uns in-situ, when it does not need an additional memo to eecute beond a small constant amount. Thee ae man algoithms that ae efficient because of this featue, theefoe it is an impotant aspect of an algoithm. In most pogamming languages, it is not obvious when an algoithm can un in-place, and moeove it is often not clea that the implementation espects that idea. In this pape we stud inteaction nets as a fomalism whee we can see diectl, visuall, that an algoithm is in-place, and moeove the implementation will espect that it is inplace. Not all algoithms can un in-place howeve. We can nevetheless still use the same language, but now we can annotate pats of the algoithm that can un in-place. We suggest an annotation fo ules, and give an algoithm to find this automaticall though analsis of the inteaction ules. 1 Intoduction n algoithm uns in-place, o in-situ, if it needs a constant amount of eta space to un. Fo an algoithm to be in-place, the input is usuall ovewitten, so mutable data-stuctues need to be suppoted b the pogamming language. Thee ae man well-known in-place algoithms, in paticula fom the domain of soting. One eample is bubble sot, that we can wite in Java fo instance: static void bubble() { int t; fo (int i = n-1; i >= 0; --i) fo (int j = 1; j <= i; ++j) if (a[j-1] > a[j]) { t = a[j-1]; a[j-1] = a[j]; a[j] = t; } } With some knowledge of what the above instuctions do, and tacing a few steps of the eecution, we can soon ealise that it uns in-place: one additional memo location (t) is all that is needed to sot the aa a of integes. In man pogams howeve, it is not obvious that an algoithm can un in-place, and moeove it is often not clea that the undeling implementation espects that idea. This issue becomes moe petinent when we eamine diffeent pogamming paadigms and diffeent pogamming stles, especiall when we have dnamic data-stuctues. In Figue 1 we give fou fagments of pogams fo inseting an element into a soted list (so pat of the insetion sot algoithm). These pogams ae witten in Polog, Haskell and Java, with the latte witten using two diffeent pogamming stles. Insetion can be witten so that it uns in-place, but it is not eas to see which of these eamples ae (o can be) in-place unless we stat to eamine the compile, the un-time sstem, and the definition of functions like cons in the case of Java. Declaative languages (functional and logic based in this eample) ae designed to be efeentiall tanspaent, so the data-stuctues ae updated in a non-destuctive wa. Moeove, it is not the pogamme who decides how memo is allocated and oganised in these languages. On the othe-hand, languages like C and Java (the impeative fagment) the pogamme does the memo allocation (and de-allocation also in some languages) eplicitl, and theefoe has a bette idea of esouce usage. These eamples illustate some of the difficulties in knowing if the pogam will un in-place o not. Pelimina Repot. Final vesion to appea in: TERMGRPH 2016 c I. Mackie &. ato This wok is licensed unde the Ceative Commons ttibution License.

2 2 In-place Gaph Rewiting with Inteaction Nets Pogam 1: Polog inset([y Ys], X, [Y s]):- Y < X,!, inset(ys, X, s). inset(ys, X, [X Ys]). Pogam 2: Haskell inset e [] = [e] inset e (:s) = if e < then e::s else :(inset e s) Pogam 3: Java (functional stle) static List inset(int, List l) { if (isempt(l) < l.head) etun cons(, l); else etun cons(l.head, inset(, l.tail)); } Figue 1: Eample pogams Pogam 4: Java (destuctive stle) static List inset(int, List l) { if (isempt(l) < l.head) etun cons(, l); else { l.tail = inset(, l.tail); etun l; } } In-place algoithms ae impotant because the can lead to moe efficient algoithms, and even change time compleit. If the data-stuctue suppots it, concatenation of two lists can be constant time if done in-place, but linea if not. Memo allocation is also epensive, so minimising it also makes it moe efficient. lthough less impotant in some was, thee ae devices that have limited space (embedded sstems, hand-held devises, etc.), so limiting the space usage if thee is no un-time impact is alwas advantageous. In this pape we use a fomalism whee we can see diectl, in fact visualise, that an algoithm is in-place, and moeove the implementation espects that it is in-place. We use the gaphical ewiting sstem of inteaction nets [5] as ou pogamming paadigm. This visual language has man similaities with tem ewiting sstems in that the ae use-defined sstems. Fo this eason, the can be consideed as specification languages. Howeve, the ae also a model of computation that equies all aspects of the computation to be eplained, including coping and gabage collection. Fo this eason the ae like an implementation model, o low-level language. It is the mitue of these featues that allows us to see diectl how the pogam can be implemented, and thus see how the memo is allocated. Not all algoithms can un in-place howeve. The fomalism will still be of use though, and we identif thee diffeent uses of the infomation we can ascetain fom inteaction ules: 1. If the ewite ules have a paticula popet then the algoithm is in-place (and will be implemented in-place). 2. If the ules can be applied in a given wa, so a stateg is needed, then the algoithm can be implemented in-place. 3. If neithe of the above hold, then we can still make use of the fomalism b e-using as much data as possible in the computation. Fo the final point, we can eithe ask the pogamme to annotate the ules, o develop an algoithm to do this automaticall. In this pape, we give eamples to motivate the fist and last points moe details including the second point will be given in a longe vesion of this pape. The space usage of algoithms, as well as the time compleit, ae fundamental in algoithm design and analsis, and well documented in man tetbooks. Thee have also been a numbe of woks that

3 I. Mackie &. ato 3 give a bound on the space usage though tpe sstems, fo eample [3], and [4]. Ou appoach is moe sntactical, and uses popeties of the undeling un-time sstem. Oveview. The est of this pape is stuctued as follows. In the net section we ecall the backgound, and give some eamples to motivate the ideas. We then give some case studies of eamples that ae in-place in ection 3. In ection 4 we intoduce an annotation fo the ules which allows fo node euse. We then go on in ection 5 to show an algoithm to annotate a ule automaticall in the case of using a fied-size node epesentation fo nodes. fte a bief discussion on how we can use this infomation in a compile in ection 6, we conclude in ection 7. 2 Backgound In the gaphical ewiting sstem of inteaction nets [5], we have a set Σ of smbols, which ae names of the nodes. Each smbol has an ait a that detemines the numbe of auilia pots that the node has. If a(α) = n fo α Σ, then α has n + 1 pots: n auilia pots and a distinguished one called the pincipal pot labelled with an aow. Nodes ae dawn as follows: 1... n net built on Σ is an undiected gaph with nodes as the vetices. The edges of the net connect nodes togethe at the pots such that thee is onl one edge at eve pot. pot which is not connected is called a fee pot. Two nodes (α,β) Σ Σ connected via thei pincipal pots fom an active pai, which is the inteaction net analogue of a ede. ule ((α,β) N) eplaces the pai (α,β) b the net N. ll the fee pots ae peseved duing eduction, and thee is at most one ule fo each pai of nodes. The following diagam illustates the idea, whee N is an net built fom Σ. n... 1 n N 1 1 m 1 m We efe to the ule ((α,β) N) as α β. The most poweful popet of this gaph ewiting sstem is that it is one-step confluent all eduction sequences ae pemutation equivalent. We use an etension of these pue inteaction nets: values can be stoed in the nodes, and ules can test these values. This is done is such a wa as to peseve the one-step confluence popet. We use this etension in the insetion sot eample below. It is possible to eason about the gaphical epesentation of nets, but it is convenient to have a tetual calculus fo compact epesentation. Thee ae seveal calculi in the liteatue, and hee we eview one calculus [2], which is a efined vesion of [1]. gents: Let Σ be a set of smbols, anged ove b α,β,..., each with a given ait a : Σ IN. n occuence of a smbol is called an agent, and the ait is the numbe of auilia pots. Names: Let N be a set of names, anged ove b,,z, etc. N and Σ ae assumed disjoint. Names coespond to wies in the gaph sstem.

4 4 In-place Gaph Rewiting with Inteaction Nets Tems: tem is built on Σ and N b the gamma: t ::= α(t 1,...,t n ) $t, whee N, α Σ, a(α) = n and t 1,...,t n,t ae tems, with the estiction that each name can appea at most twice. If n = 0, then we omit the paentheses. If a name occus twice in a tem, we sa that it is bound, othewise it is fee. We wite s,t,u to ange ove tems, and s, t, u to ange ove sequences of tems. tem of the fom α(t 1,...,t n ) can be seen as a tee with the pincipal pot of α at the oot, and the tems t 1,...,t n ae the subtees connected to the auilia pots of α. The tem $t epesents an indiection node which is ceated b eduction, and is not nomall pat of an initial tem. Intuitivel, $t coesponds to a vaiable bounded with t (o a state such that an envionment captues t). Equations: If t, u ae tems, then the unodeed pai t = u is an equation. Θ will be used to ange ove sequences of equations. Rules: Rules ae pais of tems witten: α( 1,..., n ) = β( 1,..., m ) Θ, whee (α,β) Σ Σ is the active pai, and Θ is the ight-hand side of the ule. We will abbeviate in the following the leftand ight-hand sides of the ule b LH and RH espectivel. ll names occu eactl twice in a ule, and thee is at most one ule fo each pai of agents. 3 In-place algoithms: case studies Hee we give some eample inteaction net sstems that demonstate the ideas we have discussed peviousl. The fist one is una numbes with addition. We epesent the following tem ewiting sstem: add(,)=, add((),)=add(,()) as a sstem of nets with nodes,,, and two ewite ules: The following is an eample of add((),): Net, we intoduce an eample fo the ckemann function defined b: ack 0 n = n+1, ack m 0 = ack (m-1) 1, ack m n = ack (m-1) (ack m (n-1)). We can build the inteaction net sstem on the una natual numbes that coesponds to the tem ewiting sstem as follows: 2 2 Ped 2 Dup Ped

5 I. Mackie &. ato 5 whee the node Dup duplicates and nodes, and the node Ped eases the node: Dup Dup Dup Ped The following is an eample of ewiting: 2 Dup Dup Ped Ped Ped ack 1 2 ack 0 (ack 1 1) Obsevation fo in-place unning. Inteaction nets ae quite unique as a pogamming paadigm because we ae basicall witing pogams using the intenal data-stuctue. We chaacteise thee kinds of ewiting ule: Case 1: thee ae two nodes in the ight-hand side (RH). The two nodes of the active pai can be eused. Thus, no matte which wa we evaluate, the algoithm fo these ules can un in constant space. The ules, and Dup ae classified in this case. Case 2: thee ae less than two nodes in the RH. The active pai nodes can be eused as nodes that occu in the RH, so in tems of the memo space, it can un in constant space as well. Fo instance, the ules, and Ped ae classified in this case. Case 3: thee ae moe than two nodes in the RH. Hee, active pai nodes can be eused as nodes that occu in the RH, but additional memo space is equied fo othe nodes. We divide this into two ve diffeent categoies: 1. n active pai ceates anothe active pai that is Case 2 above. These two eductions togethe make the algoithm in-place. Fo instance, in the last two-step eductions of ack 1 2 to ack 0 (ack 1 1) in the eample, we can save memo space fo two nodes when we take Ped and Dup in this ode, in compaison with the ode Dup and Ped. 2. Fo instance, the ules 2, 2 and Dup ae classified in this case. These ules ae not in-place, but the total cost can be educed b choosing the two eused nodes well. Fo instance, in the ule 2, it is bette to euse the 2 in the LH as the ight side (not the left side) because the infomation of the ight auilia pot (denoted as ) can be eused. Thus we t to euse the memo in the best wa possible. Insetion sot is a well-known in-place algoithm. The fist thee inteaction ules below encode insetion of an item into a soted list, and the final two ules encode the insetion sot algoithm. I() nil nil

6 6 In-place Gaph Rewiting with Inteaction Nets I() I() > I() I nil nil I I() I These five ules encode the whole pogam thee is nothing else. Ou eal point howeve, is that in this case a tace of the eecution (an animation of this algoithm) is showing no moe and no less than what is needed to eplain this algoithm. It is in-place because to begin with we need to put an additional I node, and the final ule fo I eases this. We invite the eade to tace the following eample net: I nil This eample is the full sstem of inteaction nets fo the insetion sot algoithm, and it uns inplace. Thee ae othe eamples, fo instance evesing a list. In this case, we need to stat with adding a ev node, and the final ule deletes it. The following two ules implement evesing an list: ev nil ev h ev h The stating configuation is shown in the following eample, which will evese the list in-place with five inteactions: nil ev nil 4 nnotating Rules In the pevious section we saw that thee ae inteaction sstems that can un in-place. To ensue that this is actuall achieved at the implementation level, we need to make sue that fo these eamples the nodes in the ule ae eused when building the new net. This idea can be also used even when thee ae moe than two nodes in the ight-hand side of the ule, and in this case thee is a choice of how to euse the nodes. We net intoduce an annotation to show which nodes in the RH of the ule ae eused. This helps the compile to analse infomation so that it can impove on the in-place eecution of pats of the pogam. nnotation: L and R. We intoduce L and R to denote whee the left-hand side and the ight-hand side nodes in the LH of a ule ae used fo in-place computation, espectivel. Fo instance, the ule is witten as follows:

7 I. Mackie &. ato 7 *R *L The advantage is that the compile is easil able to know, tavesing the net, not onl whee the active pai nodes ae used, but also which infomation about the connections should be peseved. Fo instance, in the above eample, the infomation denoted as 1 and 1 in the LH of the ule should be peseved, sa as _ 1 and _ 1, because these ae ovewitten in the RH of the ule, and the 1 and 1 in the RH should be eplaced b the _ 1 and _ 1. nnotation fo changing of the node name. To change the node name, we intoduce a name cast, such as the tpe cast of the C pogamming language, with the L and R. Fo instance, the ule 2 is witten as follows: 2 Dup Ped (*R) (*L) In this eample, the compile can also know that the infomation denoted as and in the LH of the ule should be peseved, b checking the connection of L and R. dvantage of using a fied-size node epesentation fo nodes. We epesent nodes as a fied-size node, thus fied-size auilia pots. Fo this we need to use moe space than necessa, but we can manage and euse nodes in a simple wa [6]. Hee, we assume that auilia pots ae assigned b the ode fom the left-hand side to the ight-hand side, the ule is witten as follows: (*L) o we can euse not onl the L node, but also the pointe infomation (denoted as ). 5 Deiving nnotations In the pevious section we showed how ules can be annotated with infomation about the euse of nodes. Hee, in the case of using a fied-size node epesentation, we define a function to calculate how a given tem is simila to othes. We fist intoduce some notation. Fo stings we wite double quotes ( and ). We use the notation {} in a sting as the esult of eplacing the occuence {} with its actual value. Fo instance, if = abc and = 89 then 1{}2{} = 1abc289. We use + as an infi bina opeation to concatenate stings. We also use a smbol to show the empt sequence. In ode to show whee in a tem is in a sequence of equations, we use the following tem path notation: nth (L R) : ag 1 ag 2... Fo instance, the tem t in =,α(β(s,t),z)=w is denoted as 2L:12 because the t occus in α(β(s,t),z), which is the left-hand side tem of the second equation, occus in β(s,t), which is the fist agument of the tem, and in the second agument of the tem β(s,t). Using this, we can now give an impotant definition fo this pape:

8 8 In-place Gaph Rewiting with Inteaction Nets Definition 1 (Node matching) The function Match below takes a tem and a sequence of equations, and etuns a list of a pai (scoe, tem path) whee the scoe contains the numbe of the matched agent and matched aguments. We use tandad ML notation fo lists, thus, in the following the is list concatenation. Match(t, (e 1,...,e n )) = Match e (t, e 1, e (t, e n, n) Match e (t, s = u, pos) = Match t (t, s, {pos}l : )@Match t (t, u, {pos}r : ) Match t (α( ),, tpath) = [((0,0),tpath)] Match t (α( ), β(t 1,...,t n ), tpath) = [((agentpts, namepts), t (α( ), t 1, {tpath}1 t (α( ), t n, {tpath}n ) whee agentpts = if α = β then 1 else 0 namepts = Match ns (, (t 1,...,t n )) Match ns (, t) = 0 Match ns (, ) = 0 Match ns ((, ), (t, t)) = (if = t then 1 else 0) + Match ns (, t) Thus Match will etun a list of the matching metics fo each node, and give the location in the net fo each. We can then easil etact the best one fom this infomation. The following eamples illustate how this infomation is calculated. Eample 2 The ule given peviousl is witten tetuall as ( 1, 2 ) = ( 1 ) (( 1, 2 )) = 1 Fist we take the left hand side tem ( 1, 2 ) of the active pai. etuns the following list: Match(( 1, 2 ), (( 1 ), 2 ) = 1 ) [((1,1),1L:), ((0,1),1L:1), ((0,0),1L:11), ((0,0),1L:2), ((0,0),1R:)] The fist element of this esult ((1,1),1L :) shows that the highest scoe (1,1) is obtained when we annotate the tem 1L :, which is (( 1 ), 2 ), such as ( L)(( 1 ), 2 ). Net we take the ight hand side tem ( 1 ). The following is the esult of the function Match fo ( 1 ): [((0,0),1L:), ((1,0),1L:1), ((0,0),1L:11), ((0,0),1L:2), ((0,0),1R:)] This esult shows that thee is one agent tem 1L : 1 (thus ( 1 )) that has the same id with ( 1 ), and no agent tems that have the same occuence of the agument. Theefoe, ( 1 ) should be annotated as ( R)( 1 ). These annotations coespond to the fist gaph in ection 4. Eample 3 The ule 2 given peviousl is witten tetuall as 2(,) = () = Dup((,w),Ped((w,))) The esult of Match(2(, ), = Dup((, w), Ped((w, )))) is as follows: [((0,0),1L:), ((0,0),1R:), ((0,0),1R:1), ((0,0),1R:11), ((0,0),1R:12), ((0,0),1R:2), ((0,1),1R:21)), ((0,0),1R:211), ((0,0),1R:212)].

9 I. Mackie &. ato 9 This shows that the tem 1R : 21, which is (w,), should be annotated b ( L) because it has the highest scoe (0,1). In the case of (), the esult of the Match is as follows: [((0,0),1L:), ((0,0),1R:), ((0,1),1R:1), ((0,0),1R:11), ((0,0),1R:12), ((0,0),1R:2), ((0,0),1R:21)), ((0,0),1R:211), ((0,0),1R:212)]. Thus, taking account of using a fied-size node epesentation, we find that we should annotate the tem 1R : 1, which is (,w), b ( R), though we annotated Ped in the gaph in ection 4. Of couse, the evaluation of the scoe depends on the implementation method. Howeve, in these cases, (0, 1) must be highest because the othes ae (0,0). 6 Discussion The algoithm given above can be put to use in the compilation of ules. Thee is some choice fo the compile if seveal nodes get the same scoe. We biefl summaise hee some details about the lowlevel language, and a desciption of how data-stuctues ae used. Ou contibution hee is to etend those ideas with euse. In the longe vesion of this pape we will give the algoithm fo compilation in detail and focus on the data-stuctues that ae used. n impotant esult that we get about compilation is that we do the least amount of wok in implementing the inteaction ules. The concete epesentation of an inteaction net can be summaised b the following diagam, whee Γ epesents a net, EQ a stack of equations, and I an inteface of the net: Γ EQ I The following is the epesentation of the net (,) = (w), (,w) = (), whee N ae nodes epesenting vaiables: N N EQ I The inteface of the net is whee we collect all the fee edges of a net. We have a set of instuctions that can manipulate this data-stuctue, and the compilation of a ewite ule needs to geneate code to manipulate this stuctue. What we have achieved in this pape is an annotation of a ule so that we can geneate code to manipulate data-stuctues of the kind shown above with the least amount of wok. pecificall, we limit the allocation of memo on the heap, and also avoid unnecessa gabage collection. We also find the best wa to build the RH of the ule, b e-using the memo cells and the eisting pointes. Retuning to the ideas pesented in the intoduction, we have obtained the following: Case 1: if thee ae two nodes in the RH of the ule, then the algoithm fo eecuting these ules will un in-place, and moeove we will pefom the fewest updates of pointes to build the RH. This is because the algoithm above will find the best wa of eusing both nodes and connections.

10 10 In-place Gaph Rewiting with Inteaction Nets Cases 2 and 3: Even when the algoithm is not in-place because we have moe than two nodes o fewe than two nodes in the RH, the ideas of this pape still gives the optimal implementation of the ule. We note howeve that if we change the data-stuctue, thee ma be othe solutions to this poblem, so the esult we obtain is with espect to the chosen data-stuctue. One aspect of in-place inteaction nets eduction that we have not eamined in the cuent pape is paiing up inteaction ules b using a specific eduction stateg. Fo eample, if an inteaction sstem has a ule with one node in the RH, and anothe ule with thee, then we might be able to schedule these two ules to be pefomed togethe, this maintaining the algoithm in-place. Thee ae a numbe of was we can do this at the implementation level, and we will include details of this aspect in the long vesion of the pape. 7 Conclusion We have intoduced a notion to ewite gaphs, specificall inteaction nets, in-place. We have identified a numbe of in-place algoithms and this lead us to an annotation to facilitate the implementation of in-place ewiting b e-using nodes of active pais. The main featue of this annotation is that is will give the best possible euse, so will allow the least amount of wok to be done when ewiting the gaph. We ae cuentl woking to incopoate the ideas of this pape into an implementation, using the model peviousl developed in [2]. We hope to pesent details of that, and benchmak esults at a futue time. Refeences [1] Maibel Fenández & Ian Mackie (1999): Calculus fo Inteaction Nets. In G. Nadathu, edito: Poceedings of the Intenational Confeence on Pinciples and Pactice of Declaative Pogamming (PPDP 99), Lectue Notes in Compute cience 1702, pinge-velag, pp , doi: / [2] bubaka Hassan, Ian Mackie & hina ato (2015): n Implementation Model fo Inteaction Nets. In: Poceedings 8th Intenational Wokshop on Computing with Tems and Gaphs, TERMGRPH 2014, Vienna, ustia, Jul 13, 2014., pp , doi: /eptc [3] Matin Hofmann (2000): Tpe stem fo Bounded pace and Functional In-Place Update Etended bstact. In Get molka, edito: Pogamming Languages and stems, 9th Euopean mposium on Pogamming, EOP 2000, Euopean Joint Confeences on the Theo and Pactice of oftwae, ETP 2000, Belin, Geman, Poceedings, Lectue Notes in Compute cience 1782, pinge, pp , doi: / [4] John Hughes & Las Paeto (1999): Recusion and Dnamic Data-stuctues in Bounded pace: Towads Embedded ML Pogamming. In Didie Rémi & Pete Lee, editos: Poceedings of the fouth CM IG- PLN Intenational Confeence on Functional Pogamming (ICFP 99), Pais, 1999, CM, pp , doi: / [5] Yves Lafont (1990): Inteaction Nets. In: Poceedings of the 17th CM mposium on Pinciples of Pogamming Languages (POPL 90), CM Pess, pp , doi: / [6] imon L. Peton Jones (1987): The Implementation of Functional Pogamming Languages. Pentice Hall Intenational.

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18 Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

A General Characterization of Representing and Determining Fuzzy Spatial Relations

A General Characterization of Representing and Determining Fuzzy Spatial Relations 7 The Intenational Aab Jounal of Infomation Technolog A Geneal Chaacteization of Repesenting and Detemining Fuzz Spatial Relations Lui Bai and Li Yan 2 College of Infomation Science and Engineeing, Notheasten

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Compiler-based Implementation of. Katia Gladitz. Lehrstuhl fur Informatik II, RWTH Aachen. Ahornstrae 55, W{5100 Aachen, Germany

Compiler-based Implementation of. Katia Gladitz. Lehrstuhl fur Informatik II, RWTH Aachen. Ahornstrae 55, W{5100 Aachen, Germany Compile-based Implementation of Syntax-Diected Functional Pogamming Katia Gladitz ehstuhl fu Infomatik II, RWTH Aachen Ahonstae 55, W{5100 Aachen, Gemany Heinz Fabende and Heiko Vogle Abt. Theoetische

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Using Data Flow Diagrams for Supporting Task Models

Using Data Flow Diagrams for Supporting Task Models in Companion Poc. of 5 th Euogaphics Wokshop on Design, Specification, Veification of Inteactive Systems DSV-IS 98 (Abingdon, 3-5 June 1998), P. Makopoulos & P. Johnson (Eds.), Spinge-Velag, Belin, 1998.

More information

All lengths in meters. E = = 7800 kg/m 3

All lengths in meters. E = = 7800 kg/m 3 Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

User Specified non-bonded potentials in gromacs

User Specified non-bonded potentials in gromacs Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Color Interpolation for Single CCD Color Camera

Color Interpolation for Single CCD Color Camera Colo Intepolation fo Single CCD Colo Camea Yi-Ming Wu, Chiou-Shann Fuh, and Jui-Pin Hsu Depatment of Compute Science and Infomation Engineeing, National Taian Univesit, Taipei, Taian Email: 88036@csie.ntu.edu.t;

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Modelling of real kinematics situation as a method of the system approach to the algorithm development thinking

Modelling of real kinematics situation as a method of the system approach to the algorithm development thinking Issue 4, Volume 4, 010 83 Modelling of eal kinematics situation as a method of the sstem appoach to the algoithm development thinking Stepan Hubalovsk Abstact - One of the most impotant tasks in teaching

More information

2D Transformations. Why Transformations. Translation 4/17/2009

2D Transformations. Why Transformations. Translation 4/17/2009 4/7/9 D Tansfomations Wh Tansfomations Coodinate sstem tansfomations Placing objects in the wold Move/animate the camea fo navigation Dawing hieachical chaactes Animation Tanslation + d 5,4 + d,3 d 4,

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Tufts University Math 13 Department of Mathematics November 14, :00 noon to 1:20 pm

Tufts University Math 13 Department of Mathematics November 14, :00 noon to 1:20 pm Tufts Univesit Math 3 Depatment of Mathematics Novembe, Eam : noon to : pm Instuctions: No calculatos, notes o books ae allowed. Unless othewise stated, ou must show all wok to eceive full cedit. Simplif

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering Fuzz Constaint-ased Routing lgoithm fo Taffic Engineeing Junaid. Khan and Hussein M. lnuweii Depatment of Electical & Compute Engineeing, 2356 Main Mall, Univesit of itish Columbia, Vancouve,.C. Canada,

More information

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information

The Java Virtual Machine. Compiler construction The structure of a frame. JVM stacks. Lecture 2

The Java Virtual Machine. Compiler construction The structure of a frame. JVM stacks. Lecture 2 Compile constuction 2009 Lectue 2 Code geneation 1: Geneating code The Java Vitual Machine Data types Pimitive types, including intege and floating-point types of vaious sizes and the boolean type. The

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Undecidability of Static Analysis. William Landi. Siemens Corporate Research Inc. 755 College Rd East.

Undecidability of Static Analysis. William Landi. Siemens Corporate Research Inc. 755 College Rd East. Undecidability of Static Analysis William Landi Siemens Copoate Reseach Inc 755 College Rd East Pinceton, NJ 08540 wlandi@sc.siemens.com Abstact Static Analysis of pogams is indispensable to any softwae

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994. The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

GCC-AVR Inline Assembler Cookbook Version 1.2

GCC-AVR Inline Assembler Cookbook Version 1.2 GCC-AVR Inline Assemble Cookbook Vesion 1.2 About this Document The GNU C compile fo Atmel AVR isk pocessos offes, to embed assembly language code into C pogams. This cool featue may be used fo manually

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

CS 2461: Computer Architecture 1 Program performance and High Performance Processors

CS 2461: Computer Architecture 1 Program performance and High Performance Processors Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks

More information

Hierarchical Region Mean-Based Image Segmentation

Hierarchical Region Mean-Based Image Segmentation Hieachical Region Mean-Based Image Segmentation Slawo Wesolkowski and Paul Fieguth Systems Design Engineeing Univesity of Wateloo Wateloo, Ontaio, Canada, N2L-3G1 s.wesolkowski@ieee.og, pfieguth@uwateloo.ca

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Directional Stiffness of Electronic Component Lead

Directional Stiffness of Electronic Component Lead Diectional Stiffness of Electonic Component Lead Chang H. Kim Califonia State Univesit, Long Beach Depatment of Mechanical and Aeospace Engineeing 150 Bellflowe Boulevad Long Beach, CA 90840-830, USA Abstact

More information

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Layered Animation using Displacement Maps

Layered Animation using Displacement Maps Layeed Animation using Displacement Maps Raymond Smith, Wei Sun, Adian Hilton and John Illingwoth Cente fo Vision, Speech and Signal Pocessing Univesity of Suey, Guildfod GU25XH, UK a.hilton@suey.ac.uk

More information

XML Data Integration By Graph Restructuring

XML Data Integration By Graph Restructuring XML Integation y Gaph Restuctuing Lucas Zamboulis and lexanda Poulovassilis School of Compute Science and Infomation Systems ikbeck College, Univesity of London, {lucas,ap}@dcs.bbk.ac.uk bstact This technical

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Approximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays

Approximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays 00 th Intenational Wokshop on Cellula Nanoscale Netwoks and thei Applications (CNNA) Appoximating Euclidean Distance Tansfom with Simple Opeations in Cellula Pocesso Aas Samad Razmjooei and Piot Dudek

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

Free Viewpoint Action Recognition using Motion History Volumes

Free Viewpoint Action Recognition using Motion History Volumes Fee Viewpoint Action Recognition using Motion Histoy Volumes Daniel Weinland 1, Remi Ronfad, Edmond Boye Peception-GRAVIR, INRIA Rhone-Alpes, 38334 Montbonnot Saint Matin, Fance. Abstact Action ecognition

More information

Monitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next?

Monitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next? Monitos Lectue 6 Monitos Summay: Last time A combination of data abstaction and mutual exclusion Automatic mutex Pogammed conditional synchonisation Widely used in concuent pogamming languages and libaies

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

A Consistent, User Friendly Interface for Running a Variety of Underwater Acoustic Propagation Codes

A Consistent, User Friendly Interface for Running a Variety of Underwater Acoustic Propagation Codes Poceedings of ACOUSTICS 6 - Novembe 6, Chistchuch, New Zealand A Consistent, Use Fiendly Inteface fo Running a Vaiety of Undewate Acoustic Popagation Codes Alec J Duncan, Amos L Maggi Cente fo Maine Science

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

SURVEY OF VARIOUS IMAGE ENHANCEMENT TECHNIQUES IN SPATIAL DOMAIN USING MATLAB

SURVEY OF VARIOUS IMAGE ENHANCEMENT TECHNIQUES IN SPATIAL DOMAIN USING MATLAB Intenational Jounal of Compute Applications (IJCA) (0975 8887) Intenational Confeence on Advances in Compute Engineeing & Applications (ICACEA-014) at IMSEC, GZB SURVEY OF VARIOUS IMAGE ENHANCEMENT TECHNIQUES

More information

DUe to the recent developments of gigantic social networks

DUe to the recent developments of gigantic social networks Exploing Communities in Lage Pofiled Gaphs Yankai Chen, Yixiang Fang, Reynold Cheng Membe, IEEE, Yun Li, Xiaojun Chen, Jie Zhang 1 Abstact Given a gaph G and a vetex q G, the community seach (CS) poblem

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

arxiv: v1 [cs.lo] 3 Dec 2018

arxiv: v1 [cs.lo] 3 Dec 2018 A high-level opeational semantics fo hadwae weak memoy models axiv:1812.00996v1 [cs.lo] 3 Dec 2018 Abstact Robet J. Colvin School of Electical Engineeing and Infomation Technology The Univesity of Queensland

More information

Cold Drawn Tube. Problem:

Cold Drawn Tube. Problem: Cold Dawn Tube Poblem: An AISI 1 cold-dawn steel tube has an ID of 1.5 in and an OD of 1.75 in. What maximum extenal pessue can this tube take if the lagest pincipal nomal stess is not to exceed 8 pecent

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

The Processor: Improving Performance Data Hazards

The Processor: Improving Performance Data Hazards The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline

More information