In-place Graph Rewriting with Interaction Nets
|
|
- Laurence May
- 5 years ago
- Views:
Transcription
1 In-place Gaph Rewiting with Inteaction Nets Ian Mackie hina ato n algoithm is in-place, o uns in-situ, when it does not need an additional memo to eecute beond a small constant amount. Thee ae man algoithms that ae efficient because of this featue, theefoe it is an impotant aspect of an algoithm. In most pogamming languages, it is not obvious when an algoithm can un in-place, and moeove it is often not clea that the implementation espects that idea. In this pape we stud inteaction nets as a fomalism whee we can see diectl, visuall, that an algoithm is in-place, and moeove the implementation will espect that it is inplace. Not all algoithms can un in-place howeve. We can nevetheless still use the same language, but now we can annotate pats of the algoithm that can un in-place. We suggest an annotation fo ules, and give an algoithm to find this automaticall though analsis of the inteaction ules. 1 Intoduction n algoithm uns in-place, o in-situ, if it needs a constant amount of eta space to un. Fo an algoithm to be in-place, the input is usuall ovewitten, so mutable data-stuctues need to be suppoted b the pogamming language. Thee ae man well-known in-place algoithms, in paticula fom the domain of soting. One eample is bubble sot, that we can wite in Java fo instance: static void bubble() { int t; fo (int i = n-1; i >= 0; --i) fo (int j = 1; j <= i; ++j) if (a[j-1] > a[j]) { t = a[j-1]; a[j-1] = a[j]; a[j] = t; } } With some knowledge of what the above instuctions do, and tacing a few steps of the eecution, we can soon ealise that it uns in-place: one additional memo location (t) is all that is needed to sot the aa a of integes. In man pogams howeve, it is not obvious that an algoithm can un in-place, and moeove it is often not clea that the undeling implementation espects that idea. This issue becomes moe petinent when we eamine diffeent pogamming paadigms and diffeent pogamming stles, especiall when we have dnamic data-stuctues. In Figue 1 we give fou fagments of pogams fo inseting an element into a soted list (so pat of the insetion sot algoithm). These pogams ae witten in Polog, Haskell and Java, with the latte witten using two diffeent pogamming stles. Insetion can be witten so that it uns in-place, but it is not eas to see which of these eamples ae (o can be) in-place unless we stat to eamine the compile, the un-time sstem, and the definition of functions like cons in the case of Java. Declaative languages (functional and logic based in this eample) ae designed to be efeentiall tanspaent, so the data-stuctues ae updated in a non-destuctive wa. Moeove, it is not the pogamme who decides how memo is allocated and oganised in these languages. On the othe-hand, languages like C and Java (the impeative fagment) the pogamme does the memo allocation (and de-allocation also in some languages) eplicitl, and theefoe has a bette idea of esouce usage. These eamples illustate some of the difficulties in knowing if the pogam will un in-place o not. Pelimina Repot. Final vesion to appea in: TERMGRPH 2016 c I. Mackie &. ato This wok is licensed unde the Ceative Commons ttibution License.
2 2 In-place Gaph Rewiting with Inteaction Nets Pogam 1: Polog inset([y Ys], X, [Y s]):- Y < X,!, inset(ys, X, s). inset(ys, X, [X Ys]). Pogam 2: Haskell inset e [] = [e] inset e (:s) = if e < then e::s else :(inset e s) Pogam 3: Java (functional stle) static List inset(int, List l) { if (isempt(l) < l.head) etun cons(, l); else etun cons(l.head, inset(, l.tail)); } Figue 1: Eample pogams Pogam 4: Java (destuctive stle) static List inset(int, List l) { if (isempt(l) < l.head) etun cons(, l); else { l.tail = inset(, l.tail); etun l; } } In-place algoithms ae impotant because the can lead to moe efficient algoithms, and even change time compleit. If the data-stuctue suppots it, concatenation of two lists can be constant time if done in-place, but linea if not. Memo allocation is also epensive, so minimising it also makes it moe efficient. lthough less impotant in some was, thee ae devices that have limited space (embedded sstems, hand-held devises, etc.), so limiting the space usage if thee is no un-time impact is alwas advantageous. In this pape we use a fomalism whee we can see diectl, in fact visualise, that an algoithm is in-place, and moeove the implementation espects that it is in-place. We use the gaphical ewiting sstem of inteaction nets [5] as ou pogamming paadigm. This visual language has man similaities with tem ewiting sstems in that the ae use-defined sstems. Fo this eason, the can be consideed as specification languages. Howeve, the ae also a model of computation that equies all aspects of the computation to be eplained, including coping and gabage collection. Fo this eason the ae like an implementation model, o low-level language. It is the mitue of these featues that allows us to see diectl how the pogam can be implemented, and thus see how the memo is allocated. Not all algoithms can un in-place howeve. The fomalism will still be of use though, and we identif thee diffeent uses of the infomation we can ascetain fom inteaction ules: 1. If the ewite ules have a paticula popet then the algoithm is in-place (and will be implemented in-place). 2. If the ules can be applied in a given wa, so a stateg is needed, then the algoithm can be implemented in-place. 3. If neithe of the above hold, then we can still make use of the fomalism b e-using as much data as possible in the computation. Fo the final point, we can eithe ask the pogamme to annotate the ules, o develop an algoithm to do this automaticall. In this pape, we give eamples to motivate the fist and last points moe details including the second point will be given in a longe vesion of this pape. The space usage of algoithms, as well as the time compleit, ae fundamental in algoithm design and analsis, and well documented in man tetbooks. Thee have also been a numbe of woks that
3 I. Mackie &. ato 3 give a bound on the space usage though tpe sstems, fo eample [3], and [4]. Ou appoach is moe sntactical, and uses popeties of the undeling un-time sstem. Oveview. The est of this pape is stuctued as follows. In the net section we ecall the backgound, and give some eamples to motivate the ideas. We then give some case studies of eamples that ae in-place in ection 3. In ection 4 we intoduce an annotation fo the ules which allows fo node euse. We then go on in ection 5 to show an algoithm to annotate a ule automaticall in the case of using a fied-size node epesentation fo nodes. fte a bief discussion on how we can use this infomation in a compile in ection 6, we conclude in ection 7. 2 Backgound In the gaphical ewiting sstem of inteaction nets [5], we have a set Σ of smbols, which ae names of the nodes. Each smbol has an ait a that detemines the numbe of auilia pots that the node has. If a(α) = n fo α Σ, then α has n + 1 pots: n auilia pots and a distinguished one called the pincipal pot labelled with an aow. Nodes ae dawn as follows: 1... n net built on Σ is an undiected gaph with nodes as the vetices. The edges of the net connect nodes togethe at the pots such that thee is onl one edge at eve pot. pot which is not connected is called a fee pot. Two nodes (α,β) Σ Σ connected via thei pincipal pots fom an active pai, which is the inteaction net analogue of a ede. ule ((α,β) N) eplaces the pai (α,β) b the net N. ll the fee pots ae peseved duing eduction, and thee is at most one ule fo each pai of nodes. The following diagam illustates the idea, whee N is an net built fom Σ. n... 1 n N 1 1 m 1 m We efe to the ule ((α,β) N) as α β. The most poweful popet of this gaph ewiting sstem is that it is one-step confluent all eduction sequences ae pemutation equivalent. We use an etension of these pue inteaction nets: values can be stoed in the nodes, and ules can test these values. This is done is such a wa as to peseve the one-step confluence popet. We use this etension in the insetion sot eample below. It is possible to eason about the gaphical epesentation of nets, but it is convenient to have a tetual calculus fo compact epesentation. Thee ae seveal calculi in the liteatue, and hee we eview one calculus [2], which is a efined vesion of [1]. gents: Let Σ be a set of smbols, anged ove b α,β,..., each with a given ait a : Σ IN. n occuence of a smbol is called an agent, and the ait is the numbe of auilia pots. Names: Let N be a set of names, anged ove b,,z, etc. N and Σ ae assumed disjoint. Names coespond to wies in the gaph sstem.
4 4 In-place Gaph Rewiting with Inteaction Nets Tems: tem is built on Σ and N b the gamma: t ::= α(t 1,...,t n ) $t, whee N, α Σ, a(α) = n and t 1,...,t n,t ae tems, with the estiction that each name can appea at most twice. If n = 0, then we omit the paentheses. If a name occus twice in a tem, we sa that it is bound, othewise it is fee. We wite s,t,u to ange ove tems, and s, t, u to ange ove sequences of tems. tem of the fom α(t 1,...,t n ) can be seen as a tee with the pincipal pot of α at the oot, and the tems t 1,...,t n ae the subtees connected to the auilia pots of α. The tem $t epesents an indiection node which is ceated b eduction, and is not nomall pat of an initial tem. Intuitivel, $t coesponds to a vaiable bounded with t (o a state such that an envionment captues t). Equations: If t, u ae tems, then the unodeed pai t = u is an equation. Θ will be used to ange ove sequences of equations. Rules: Rules ae pais of tems witten: α( 1,..., n ) = β( 1,..., m ) Θ, whee (α,β) Σ Σ is the active pai, and Θ is the ight-hand side of the ule. We will abbeviate in the following the leftand ight-hand sides of the ule b LH and RH espectivel. ll names occu eactl twice in a ule, and thee is at most one ule fo each pai of agents. 3 In-place algoithms: case studies Hee we give some eample inteaction net sstems that demonstate the ideas we have discussed peviousl. The fist one is una numbes with addition. We epesent the following tem ewiting sstem: add(,)=, add((),)=add(,()) as a sstem of nets with nodes,,, and two ewite ules: The following is an eample of add((),): Net, we intoduce an eample fo the ckemann function defined b: ack 0 n = n+1, ack m 0 = ack (m-1) 1, ack m n = ack (m-1) (ack m (n-1)). We can build the inteaction net sstem on the una natual numbes that coesponds to the tem ewiting sstem as follows: 2 2 Ped 2 Dup Ped
5 I. Mackie &. ato 5 whee the node Dup duplicates and nodes, and the node Ped eases the node: Dup Dup Dup Ped The following is an eample of ewiting: 2 Dup Dup Ped Ped Ped ack 1 2 ack 0 (ack 1 1) Obsevation fo in-place unning. Inteaction nets ae quite unique as a pogamming paadigm because we ae basicall witing pogams using the intenal data-stuctue. We chaacteise thee kinds of ewiting ule: Case 1: thee ae two nodes in the ight-hand side (RH). The two nodes of the active pai can be eused. Thus, no matte which wa we evaluate, the algoithm fo these ules can un in constant space. The ules, and Dup ae classified in this case. Case 2: thee ae less than two nodes in the RH. The active pai nodes can be eused as nodes that occu in the RH, so in tems of the memo space, it can un in constant space as well. Fo instance, the ules, and Ped ae classified in this case. Case 3: thee ae moe than two nodes in the RH. Hee, active pai nodes can be eused as nodes that occu in the RH, but additional memo space is equied fo othe nodes. We divide this into two ve diffeent categoies: 1. n active pai ceates anothe active pai that is Case 2 above. These two eductions togethe make the algoithm in-place. Fo instance, in the last two-step eductions of ack 1 2 to ack 0 (ack 1 1) in the eample, we can save memo space fo two nodes when we take Ped and Dup in this ode, in compaison with the ode Dup and Ped. 2. Fo instance, the ules 2, 2 and Dup ae classified in this case. These ules ae not in-place, but the total cost can be educed b choosing the two eused nodes well. Fo instance, in the ule 2, it is bette to euse the 2 in the LH as the ight side (not the left side) because the infomation of the ight auilia pot (denoted as ) can be eused. Thus we t to euse the memo in the best wa possible. Insetion sot is a well-known in-place algoithm. The fist thee inteaction ules below encode insetion of an item into a soted list, and the final two ules encode the insetion sot algoithm. I() nil nil
6 6 In-place Gaph Rewiting with Inteaction Nets I() I() > I() I nil nil I I() I These five ules encode the whole pogam thee is nothing else. Ou eal point howeve, is that in this case a tace of the eecution (an animation of this algoithm) is showing no moe and no less than what is needed to eplain this algoithm. It is in-place because to begin with we need to put an additional I node, and the final ule fo I eases this. We invite the eade to tace the following eample net: I nil This eample is the full sstem of inteaction nets fo the insetion sot algoithm, and it uns inplace. Thee ae othe eamples, fo instance evesing a list. In this case, we need to stat with adding a ev node, and the final ule deletes it. The following two ules implement evesing an list: ev nil ev h ev h The stating configuation is shown in the following eample, which will evese the list in-place with five inteactions: nil ev nil 4 nnotating Rules In the pevious section we saw that thee ae inteaction sstems that can un in-place. To ensue that this is actuall achieved at the implementation level, we need to make sue that fo these eamples the nodes in the ule ae eused when building the new net. This idea can be also used even when thee ae moe than two nodes in the ight-hand side of the ule, and in this case thee is a choice of how to euse the nodes. We net intoduce an annotation to show which nodes in the RH of the ule ae eused. This helps the compile to analse infomation so that it can impove on the in-place eecution of pats of the pogam. nnotation: L and R. We intoduce L and R to denote whee the left-hand side and the ight-hand side nodes in the LH of a ule ae used fo in-place computation, espectivel. Fo instance, the ule is witten as follows:
7 I. Mackie &. ato 7 *R *L The advantage is that the compile is easil able to know, tavesing the net, not onl whee the active pai nodes ae used, but also which infomation about the connections should be peseved. Fo instance, in the above eample, the infomation denoted as 1 and 1 in the LH of the ule should be peseved, sa as _ 1 and _ 1, because these ae ovewitten in the RH of the ule, and the 1 and 1 in the RH should be eplaced b the _ 1 and _ 1. nnotation fo changing of the node name. To change the node name, we intoduce a name cast, such as the tpe cast of the C pogamming language, with the L and R. Fo instance, the ule 2 is witten as follows: 2 Dup Ped (*R) (*L) In this eample, the compile can also know that the infomation denoted as and in the LH of the ule should be peseved, b checking the connection of L and R. dvantage of using a fied-size node epesentation fo nodes. We epesent nodes as a fied-size node, thus fied-size auilia pots. Fo this we need to use moe space than necessa, but we can manage and euse nodes in a simple wa [6]. Hee, we assume that auilia pots ae assigned b the ode fom the left-hand side to the ight-hand side, the ule is witten as follows: (*L) o we can euse not onl the L node, but also the pointe infomation (denoted as ). 5 Deiving nnotations In the pevious section we showed how ules can be annotated with infomation about the euse of nodes. Hee, in the case of using a fied-size node epesentation, we define a function to calculate how a given tem is simila to othes. We fist intoduce some notation. Fo stings we wite double quotes ( and ). We use the notation {} in a sting as the esult of eplacing the occuence {} with its actual value. Fo instance, if = abc and = 89 then 1{}2{} = 1abc289. We use + as an infi bina opeation to concatenate stings. We also use a smbol to show the empt sequence. In ode to show whee in a tem is in a sequence of equations, we use the following tem path notation: nth (L R) : ag 1 ag 2... Fo instance, the tem t in =,α(β(s,t),z)=w is denoted as 2L:12 because the t occus in α(β(s,t),z), which is the left-hand side tem of the second equation, occus in β(s,t), which is the fist agument of the tem, and in the second agument of the tem β(s,t). Using this, we can now give an impotant definition fo this pape:
8 8 In-place Gaph Rewiting with Inteaction Nets Definition 1 (Node matching) The function Match below takes a tem and a sequence of equations, and etuns a list of a pai (scoe, tem path) whee the scoe contains the numbe of the matched agent and matched aguments. We use tandad ML notation fo lists, thus, in the following the is list concatenation. Match(t, (e 1,...,e n )) = Match e (t, e 1, e (t, e n, n) Match e (t, s = u, pos) = Match t (t, s, {pos}l : )@Match t (t, u, {pos}r : ) Match t (α( ),, tpath) = [((0,0),tpath)] Match t (α( ), β(t 1,...,t n ), tpath) = [((agentpts, namepts), t (α( ), t 1, {tpath}1 t (α( ), t n, {tpath}n ) whee agentpts = if α = β then 1 else 0 namepts = Match ns (, (t 1,...,t n )) Match ns (, t) = 0 Match ns (, ) = 0 Match ns ((, ), (t, t)) = (if = t then 1 else 0) + Match ns (, t) Thus Match will etun a list of the matching metics fo each node, and give the location in the net fo each. We can then easil etact the best one fom this infomation. The following eamples illustate how this infomation is calculated. Eample 2 The ule given peviousl is witten tetuall as ( 1, 2 ) = ( 1 ) (( 1, 2 )) = 1 Fist we take the left hand side tem ( 1, 2 ) of the active pai. etuns the following list: Match(( 1, 2 ), (( 1 ), 2 ) = 1 ) [((1,1),1L:), ((0,1),1L:1), ((0,0),1L:11), ((0,0),1L:2), ((0,0),1R:)] The fist element of this esult ((1,1),1L :) shows that the highest scoe (1,1) is obtained when we annotate the tem 1L :, which is (( 1 ), 2 ), such as ( L)(( 1 ), 2 ). Net we take the ight hand side tem ( 1 ). The following is the esult of the function Match fo ( 1 ): [((0,0),1L:), ((1,0),1L:1), ((0,0),1L:11), ((0,0),1L:2), ((0,0),1R:)] This esult shows that thee is one agent tem 1L : 1 (thus ( 1 )) that has the same id with ( 1 ), and no agent tems that have the same occuence of the agument. Theefoe, ( 1 ) should be annotated as ( R)( 1 ). These annotations coespond to the fist gaph in ection 4. Eample 3 The ule 2 given peviousl is witten tetuall as 2(,) = () = Dup((,w),Ped((w,))) The esult of Match(2(, ), = Dup((, w), Ped((w, )))) is as follows: [((0,0),1L:), ((0,0),1R:), ((0,0),1R:1), ((0,0),1R:11), ((0,0),1R:12), ((0,0),1R:2), ((0,1),1R:21)), ((0,0),1R:211), ((0,0),1R:212)].
9 I. Mackie &. ato 9 This shows that the tem 1R : 21, which is (w,), should be annotated b ( L) because it has the highest scoe (0,1). In the case of (), the esult of the Match is as follows: [((0,0),1L:), ((0,0),1R:), ((0,1),1R:1), ((0,0),1R:11), ((0,0),1R:12), ((0,0),1R:2), ((0,0),1R:21)), ((0,0),1R:211), ((0,0),1R:212)]. Thus, taking account of using a fied-size node epesentation, we find that we should annotate the tem 1R : 1, which is (,w), b ( R), though we annotated Ped in the gaph in ection 4. Of couse, the evaluation of the scoe depends on the implementation method. Howeve, in these cases, (0, 1) must be highest because the othes ae (0,0). 6 Discussion The algoithm given above can be put to use in the compilation of ules. Thee is some choice fo the compile if seveal nodes get the same scoe. We biefl summaise hee some details about the lowlevel language, and a desciption of how data-stuctues ae used. Ou contibution hee is to etend those ideas with euse. In the longe vesion of this pape we will give the algoithm fo compilation in detail and focus on the data-stuctues that ae used. n impotant esult that we get about compilation is that we do the least amount of wok in implementing the inteaction ules. The concete epesentation of an inteaction net can be summaised b the following diagam, whee Γ epesents a net, EQ a stack of equations, and I an inteface of the net: Γ EQ I The following is the epesentation of the net (,) = (w), (,w) = (), whee N ae nodes epesenting vaiables: N N EQ I The inteface of the net is whee we collect all the fee edges of a net. We have a set of instuctions that can manipulate this data-stuctue, and the compilation of a ewite ule needs to geneate code to manipulate this stuctue. What we have achieved in this pape is an annotation of a ule so that we can geneate code to manipulate data-stuctues of the kind shown above with the least amount of wok. pecificall, we limit the allocation of memo on the heap, and also avoid unnecessa gabage collection. We also find the best wa to build the RH of the ule, b e-using the memo cells and the eisting pointes. Retuning to the ideas pesented in the intoduction, we have obtained the following: Case 1: if thee ae two nodes in the RH of the ule, then the algoithm fo eecuting these ules will un in-place, and moeove we will pefom the fewest updates of pointes to build the RH. This is because the algoithm above will find the best wa of eusing both nodes and connections.
10 10 In-place Gaph Rewiting with Inteaction Nets Cases 2 and 3: Even when the algoithm is not in-place because we have moe than two nodes o fewe than two nodes in the RH, the ideas of this pape still gives the optimal implementation of the ule. We note howeve that if we change the data-stuctue, thee ma be othe solutions to this poblem, so the esult we obtain is with espect to the chosen data-stuctue. One aspect of in-place inteaction nets eduction that we have not eamined in the cuent pape is paiing up inteaction ules b using a specific eduction stateg. Fo eample, if an inteaction sstem has a ule with one node in the RH, and anothe ule with thee, then we might be able to schedule these two ules to be pefomed togethe, this maintaining the algoithm in-place. Thee ae a numbe of was we can do this at the implementation level, and we will include details of this aspect in the long vesion of the pape. 7 Conclusion We have intoduced a notion to ewite gaphs, specificall inteaction nets, in-place. We have identified a numbe of in-place algoithms and this lead us to an annotation to facilitate the implementation of in-place ewiting b e-using nodes of active pais. The main featue of this annotation is that is will give the best possible euse, so will allow the least amount of wok to be done when ewiting the gaph. We ae cuentl woking to incopoate the ideas of this pape into an implementation, using the model peviousl developed in [2]. We hope to pesent details of that, and benchmak esults at a futue time. Refeences [1] Maibel Fenández & Ian Mackie (1999): Calculus fo Inteaction Nets. In G. Nadathu, edito: Poceedings of the Intenational Confeence on Pinciples and Pactice of Declaative Pogamming (PPDP 99), Lectue Notes in Compute cience 1702, pinge-velag, pp , doi: / [2] bubaka Hassan, Ian Mackie & hina ato (2015): n Implementation Model fo Inteaction Nets. In: Poceedings 8th Intenational Wokshop on Computing with Tems and Gaphs, TERMGRPH 2014, Vienna, ustia, Jul 13, 2014., pp , doi: /eptc [3] Matin Hofmann (2000): Tpe stem fo Bounded pace and Functional In-Place Update Etended bstact. In Get molka, edito: Pogamming Languages and stems, 9th Euopean mposium on Pogamming, EOP 2000, Euopean Joint Confeences on the Theo and Pactice of oftwae, ETP 2000, Belin, Geman, Poceedings, Lectue Notes in Compute cience 1782, pinge, pp , doi: / [4] John Hughes & Las Paeto (1999): Recusion and Dnamic Data-stuctues in Bounded pace: Towads Embedded ML Pogamming. In Didie Rémi & Pete Lee, editos: Poceedings of the fouth CM IG- PLN Intenational Confeence on Functional Pogamming (ICFP 99), Pais, 1999, CM, pp , doi: / [5] Yves Lafont (1990): Inteaction Nets. In: Poceedings of the 17th CM mposium on Pinciples of Pogamming Languages (POPL 90), CM Pess, pp , doi: / [6] imon L. Peton Jones (1987): The Implementation of Functional Pogamming Languages. Pentice Hall Intenational.
a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More information4.2. Co-terminal and Related Angles. Investigate
.2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as
More information(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.
Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationReader & ReaderT Monad (11A) Young Won Lim 8/20/18
Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationA General Characterization of Representing and Determining Fuzzy Spatial Relations
7 The Intenational Aab Jounal of Infomation Technolog A Geneal Chaacteization of Repesenting and Detemining Fuzz Spatial Relations Lui Bai and Li Yan 2 College of Infomation Science and Engineeing, Notheasten
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationCompiler-based Implementation of. Katia Gladitz. Lehrstuhl fur Informatik II, RWTH Aachen. Ahornstrae 55, W{5100 Aachen, Germany
Compile-based Implementation of Syntax-Diected Functional Pogamming Katia Gladitz ehstuhl fu Infomatik II, RWTH Aachen Ahonstae 55, W{5100 Aachen, Gemany Heinz Fabende and Heiko Vogle Abt. Theoetische
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationUsing Data Flow Diagrams for Supporting Task Models
in Companion Poc. of 5 th Euogaphics Wokshop on Design, Specification, Veification of Inteactive Systems DSV-IS 98 (Abingdon, 3-5 June 1998), P. Makopoulos & P. Johnson (Eds.), Spinge-Velag, Belin, 1998.
More informationAll lengths in meters. E = = 7800 kg/m 3
Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationPOMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler
POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationAn Extension to the Local Binary Patterns for Image Retrieval
, pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science
More informationA New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE
5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai
More informationUser Specified non-bonded potentials in gromacs
Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of
More informationFACE VECTORS OF FLAG COMPLEXES
FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.
More informationInformation Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes
CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues
More informationAny modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationColor Interpolation for Single CCD Color Camera
Colo Intepolation fo Single CCD Colo Camea Yi-Ming Wu, Chiou-Shann Fuh, and Jui-Pin Hsu Depatment of Compute Science and Infomation Engineeing, National Taian Univesit, Taipei, Taian Email: 88036@csie.ntu.edu.t;
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationModelling of real kinematics situation as a method of the system approach to the algorithm development thinking
Issue 4, Volume 4, 010 83 Modelling of eal kinematics situation as a method of the sstem appoach to the algoithm development thinking Stepan Hubalovsk Abstact - One of the most impotant tasks in teaching
More information2D Transformations. Why Transformations. Translation 4/17/2009
4/7/9 D Tansfomations Wh Tansfomations Coodinate sstem tansfomations Placing objects in the wold Move/animate the camea fo navigation Dawing hieachical chaactes Animation Tanslation + d 5,4 + d,3 d 4,
More informationLecture 27: Voronoi Diagrams
We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationXFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers
XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio
More informationEmbeddings into Crossed Cubes
Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability
More informationImprovement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1
Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationUCB CS61C : Machine Structures
inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationTufts University Math 13 Department of Mathematics November 14, :00 noon to 1:20 pm
Tufts Univesit Math 3 Depatment of Mathematics Novembe, Eam : noon to : pm Instuctions: No calculatos, notes o books ae allowed. Unless othewise stated, ou must show all wok to eceive full cedit. Simplif
More informationAlso available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)
Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationAnd Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,
(IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationA Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces
A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu
More informationReachable State Spaces of Distributed Deadlock Avoidance Protocols
Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications
More informationImage Enhancement in the Spatial Domain. Spatial Domain
8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along
More informationA Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering
Fuzz Constaint-ased Routing lgoithm fo Taffic Engineeing Junaid. Khan and Hussein M. lnuweii Depatment of Electical & Compute Engineeing, 2356 Main Mall, Univesit of itish Columbia, Vancouve,.C. Canada,
More informationOPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO
OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal
More informationLecture 8 Introduction to Pipelines Adapated from slides by David Patterson
Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.
More informationThe Java Virtual Machine. Compiler construction The structure of a frame. JVM stacks. Lecture 2
Compile constuction 2009 Lectue 2 Code geneation 1: Geneating code The Java Vitual Machine Data types Pimitive types, including intege and floating-point types of vaious sizes and the boolean type. The
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationUndecidability of Static Analysis. William Landi. Siemens Corporate Research Inc. 755 College Rd East.
Undecidability of Static Analysis William Landi Siemens Copoate Reseach Inc 755 College Rd East Pinceton, NJ 08540 wlandi@sc.siemens.com Abstact Static Analysis of pogams is indispensable to any softwae
More informationObstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor
Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,
More informationThe International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.
The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy
More informationarxiv: v4 [cs.ds] 7 Feb 2018
Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data
More informationGCC-AVR Inline Assembler Cookbook Version 1.2
GCC-AVR Inline Assemble Cookbook Vesion 1.2 About this Document The GNU C compile fo Atmel AVR isk pocessos offes, to embed assembly language code into C pogams. This cool featue may be used fo manually
More informationEfficient Execution Path Exploration for Detecting Races in Concurrent Programs
IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent
More informationLecture # 04. Image Enhancement in Spatial Domain
Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationPositioning of a robot based on binocular vision for hand / foot fusion Long Han
2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,
More informationCS 2461: Computer Architecture 1 Program performance and High Performance Processors
Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks
More informationHierarchical Region Mean-Based Image Segmentation
Hieachical Region Mean-Based Image Segmentation Slawo Wesolkowski and Paul Fieguth Systems Design Engineeing Univesity of Wateloo Wateloo, Ontaio, Canada, N2L-3G1 s.wesolkowski@ieee.og, pfieguth@uwateloo.ca
More informationA VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM
Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,
More informationDirectional Stiffness of Electronic Component Lead
Diectional Stiffness of Electonic Component Lead Chang H. Kim Califonia State Univesit, Long Beach Depatment of Mechanical and Aeospace Engineeing 150 Bellflowe Boulevad Long Beach, CA 90840-830, USA Abstact
More informationQuery Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented
Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation
More informationCardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions
Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationA Novel Automatic White Balance Method For Digital Still Cameras
A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationLecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining
EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationThe EigenRumor Algorithm for Ranking Blogs
he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy
More informationLayered Animation using Displacement Maps
Layeed Animation using Displacement Maps Raymond Smith, Wei Sun, Adian Hilton and John Illingwoth Cente fo Vision, Speech and Signal Pocessing Univesity of Suey, Guildfod GU25XH, UK a.hilton@suey.ac.uk
More informationXML Data Integration By Graph Restructuring
XML Integation y Gaph Restuctuing Lucas Zamboulis and lexanda Poulovassilis School of Compute Science and Infomation Systems ikbeck College, Univesity of London, {lucas,ap}@dcs.bbk.ac.uk bstact This technical
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationDEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson
DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationApproximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays
00 th Intenational Wokshop on Cellula Nanoscale Netwoks and thei Applications (CNNA) Appoximating Euclidean Distance Tansfom with Simple Opeations in Cellula Pocesso Aas Samad Razmjooei and Piot Dudek
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationAutomatically Testing Interacting Software Components
Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt
More informationFree Viewpoint Action Recognition using Motion History Volumes
Fee Viewpoint Action Recognition using Motion Histoy Volumes Daniel Weinland 1, Remi Ronfad, Edmond Boye Peception-GRAVIR, INRIA Rhone-Alpes, 38334 Montbonnot Saint Matin, Fance. Abstact Action ecognition
More informationMonitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next?
Monitos Lectue 6 Monitos Summay: Last time A combination of data abstaction and mutual exclusion Automatic mutex Pogammed conditional synchonisation Widely used in concuent pogamming languages and libaies
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationART GALLERIES WITH INTERIOR WALLS. March 1998
ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall
More informationSimulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM
J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on
More informationA Consistent, User Friendly Interface for Running a Variety of Underwater Acoustic Propagation Codes
Poceedings of ACOUSTICS 6 - Novembe 6, Chistchuch, New Zealand A Consistent, Use Fiendly Inteface fo Running a Vaiety of Undewate Acoustic Popagation Codes Alec J Duncan, Amos L Maggi Cente fo Maine Science
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More informationSURVEY OF VARIOUS IMAGE ENHANCEMENT TECHNIQUES IN SPATIAL DOMAIN USING MATLAB
Intenational Jounal of Compute Applications (IJCA) (0975 8887) Intenational Confeence on Advances in Compute Engineeing & Applications (ICACEA-014) at IMSEC, GZB SURVEY OF VARIOUS IMAGE ENHANCEMENT TECHNIQUES
More informationDUe to the recent developments of gigantic social networks
Exploing Communities in Lage Pofiled Gaphs Yankai Chen, Yixiang Fang, Reynold Cheng Membe, IEEE, Yun Li, Xiaojun Chen, Jie Zhang 1 Abstact Given a gaph G and a vetex q G, the community seach (CS) poblem
More informationData mining based automated reverse engineering and defect discovery
Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue
More informationPipes, connections, channels and multiplexors
Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok
More informationarxiv: v1 [cs.lo] 3 Dec 2018
A high-level opeational semantics fo hadwae weak memoy models axiv:1812.00996v1 [cs.lo] 3 Dec 2018 Abstact Robet J. Colvin School of Electical Engineeing and Infomation Technology The Univesity of Queensland
More informationCold Drawn Tube. Problem:
Cold Dawn Tube Poblem: An AISI 1 cold-dawn steel tube has an ID of 1.5 in and an OD of 1.75 in. What maximum extenal pessue can this tube take if the lagest pincipal nomal stess is not to exceed 8 pecent
More informationEfficient protection of many-to-one. communications
Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok
More informationConservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery
Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationThe Processor: Improving Performance Data Hazards
The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline
More information