Parallel Solutions of Indexed Recurrence Equations

Size: px
Start display at page:

Download "Parallel Solutions of Indexed Recurrence Equations"

Transcription

1 Parallel Solutons of Indexed Recurrence Equatons Yos Ben-Asher Dep of Math and CS Hafa Unversty 905 Hafa, Israel Gad Haber IBM Scence and Technology 905 Hafa, Israel Abstract A new type of recurrence equatons called ndexed recurrences (IR) s defned, n whch the common noton of X[] = op(x[];x[,]) = :::ns generalzed to X[g()] = op(x[f()];x[h()]) f; g; h : f:::ng7! f:::mg Ths enables us to model sequental loops of the form X[g()] := op(x[f ()];X[h()]; ) as IR equatons Thus, a parallel algorthm that solves a set of IR equatons s n fact a way to transform sequental loops nto parallel ones Note that the crcut evaluaton problem (CP) can also be expressed as a set of IR equatons Therefore an effcent parallel soluton to the general IR problem s not lkely to be found, as such soluton would also solve the CP, showng that P NC In ths paper we ntroduce parallel algorthms for two varants of the IR equatons problem: An O(log n) greedy algorthm for solvng IR equatons where g() s dstnct and h() = g() usng O(n) processors An O(log n) algorthm wth no restrcton on f; g or h, usng up to O(n ) processors However, we show that for general IR, op must be commutatve so that a parallel computaton can be used Introducton We consder a certan generalzaton of ordnary recurrence equatons called ndexed recurrence (IR) equatons Gven an ntalzed array A[::m], asetofn IR equatons have the form A[g()] := op(a[f()];a[h()]) whch can be represented by a sequental loop of the form A[g()] := op(a[f ()];A[h()]); where op s a bnary assocatve operator and where f; g : f::ng 7!f::mg do not nclude references to elements of the A[] array tself The goal s to use the parallel solutons of these IR equatons n order to parallelze sequental loops whose executon can be smulated by a set of IR equatons Ths s smlar to the way that parallel solutons of lnear recurrences (A[] = op(a[, ];A[])) are used to parallelze sequental loops [] of the form: A[] := op(a[, ];A[]); In our work, we analyzed the well known Lvermore Loops [] and checked how many of them ft nto the general frame of IR equatons n compare to ordnary recurrence equatons There are loops n ths code, often used as a benchmark for parallelzng complers, and contan typcal code for scentfc computng Out of the loops we found that: loops,7,8,,5,6, do not contan recurrences of any type; loops,5,,9 contan lnear recurrences; all other loops (except for,0,) contan ndexed recurrences Ordnary Indexed Recurrences Ths secton descrbes the parallel algorthm for computng a set of IR equatons where g() s dstnct and h() = g() Ths case s smpler than the general one, and the parallel algorthm we obtan s more effcent than the one for the general case, and uses O(n) processors It s easy to begn wth the sequental algorthm namely, the followng loop: Array A[::m] wth ntal values; A[g()] := A[f ()] A[g()]; For convenence, we have replaced the notaton of op(x; y) wth x y, where s the sutable bnary and assocatve operaton Note that op s not necessarly a commutatve operaton, therefore our algorthm should preserve the multplcatons order (e the order of operatons)

2 for = to n do A[] := A[ + ] A[]; After 8 teratons: A 0 [] =A[] A 0 [5]=A[5] A 0 []=A[]A[] A 0 [6]=A[]A[]A[6] A 0 []=A[] A 0 [7]=A[7] A 0 []=A[]A[] A 0 [8]=A[5]A[8] Fgure An example of an Ordnary IR loop The above loop can be vewed as a functon for computng a new value A 0 = F (A; n; f; g) (also denoted as OrdnaryIR(A; f; g; )) where A s the ntal array and A 0 s the array after executng the loop We therefore need to fnd a parallel algorthm that computes F (A; n; f; g) n less than n steps Ths s analogous to the way n whch prefx-sum [] s used to solve ordnary recurrence equatons F (A; op(x; y)) = prefx-sum(a; op(x; y)) The value of A 0 [g()] s a product of a subset of elements n A As an example consder the loop n fg where n every teraton, A[] s updated by A[ + ] A[] Some of the elements A 0 [] preserve ther ntal values, eg A 0 [7] =A[7](snce there s no n such that g() =7) Whle the trace of other A 0 [] contan the multplcatons of several elements, eg A 0 [6] =A[]A[]A[6](snce g() =6;f()=, and then g() =f()and f () =) Fnally, A[] s the last tem n the trace of A 0 [6] snce there s no < such that g() =f() The sequence of multplcatons of every element n A 0 [] (also called the trace of A[g()]) s gven by the followng lemma: Lemma Let A 0 [] denote the value of A[] after the executon of the loop for = ;:::;ndoa[g()] = A[f ()] A[g()] then for all = :::n such that: j = A 0 [g()] = A[f (j k)] :::A[f(j)] A[g()] for t = :::kthe ndces j t satsfy that j t <j t, and g(j t )=f(j t, ) j k s the last ndex for whch g(j t )=f(j t, ), e, there s no j k+ < j k such that g(j k+ ) = f(j k ) Lemma suggests a smple method for computng A 0 [g()] n parallel Let A,t [g()] denote the sub-trace wth t + rghtmost elements n the trace of A 0 [g()], e, A,t [g()] = A[f (j k,t)] :::A[f()] A[g()] Consder the concatenaton (or multplcaton ) of two successve sub-traces: A,(t +t ) [g()] = A,t [g(j)] A,t [g()] where g(j) =f(j k,t )and A[f (j k,t )] s the last element n A,t [g()] Note that A[g(j)] s multpled twce, once as A[g(j)] and once as A[f(j k,t )] Ths can be corrected by takng the trace of ts predecessor A,t [f(j)] so that A,(t +t ) [g()] = A,t [f (j)] A,t [g()] = A[f (j 0 k,t )] :::A[f(j)] A[f (j 0 k,t )] :::A[g()] = A[f (j 0 k,t )] :::A[g(j 0 )] A[g(j)] :::A[g()] where j 0 <jand j 0 s the teraton number n whch A[f(j)] s last updated n the loop The proposed algorthm s a smple greedy algorthm that keeps teratng untl all traces are completed, where n each teraton all possble concatenatons of successve sub-traces are computed n parallel Thus, ntally, we can compute n parallel the frst product of each trace A[g()] = A[f ()] A[g()] (for all = ;:::;n) The concatenaton operaton of two successve sub-traces A,t [g(j)];a,t [g(j)] can be mplemented usng that: the value of a sub-trace A,t [g()] s stored n ts array element A[g()] a ponter N [g()] ponts to the sub-trace A,t [g(j)] to be concatenated to A,t [g()] (to form A,(t+t) [g()]) Hence, A[N [g()]] contans the value of the sub-trace A,t [g(j)] Intally all traces are of length, and can be computed n parallel The code for a concatenaton step of future teratons s therefore as follows: multplcaton- A[g()] = A,(t+t) [g()] = A[N [g()]] A[g()] ponter updatng- N [g()],(t+t) = N [N [g()]], where N [;:::;m]s ntalzed as follows: N [x] = f() 9, n and g() =x 0 Otherwse Snce we start wth traces of length, then for each = ::n N [g()] = N [N [g()]] The way n whch the concatenaton operaton works s depcted n fg showng two parallel concatenatons of sub-traces The operaton N [g()],(t+t) = N [N [g()]] s depcted by the fact that the next-ponter of a new trace s taken to be that of the joned trace The algorthm performs log n teratons In each teraton, the above concatenaton operaton (the multplcaton followed by the updatng)s performed n parallel for all traces A 0 [g()] As a result, n each teraton, ether a trace s fully computed or the number

3 -5 A[9] A[8] A[7] A[6] A[5] A[] A[] A[] A[] A[0] A[9] - A[7] - A[] - A [8] - A[9] A[8] A[7] A[6] A[5] A[] A[] A[] A[] A[0] A[9] A [8] -6 Ths s not an ordnary IR recurrence due to the nonassocatve nature of the operators f (x) = ax+b c x+d (where = ; ;:::n) However, we can transform the recurrence nto an ordnary IR problem by explotng a useful qualty of these operators as shown n the followng theorem Fgure The concatenaton operaton of two traces of elements n the product of a trace s doubled due to the multplcaton A,(t +t ) [g()] = A,t [g(j)] A,t [g()]: Hence, log n teratons are suffcent Clearly, once a trace has been completed (fully computed) we must not contnue to concatenate any more traces to t It therefore remans to determne when the computaton of a trace has completed In general, n every teraton and for every trace stored n A[g()], the algorthm must determne: the exstence of A[g(j)] such that ts trace can be concatenated to the trace of A[g()] f the computaton of the trace of A[g()] s completed, then no more redundant traces should be added to t A more effcent verson of the algorthm whch forks only up to P processes at the same tme, was programmed and tested on the SmParC [5] smulator Hence, ths verson complexty s T (n; P ) = n log n Fgure shows the P results obtaned for an array of sze n = 50; 000 and for P = #processors << n The Y axs represents the complexty n unts of assembly nstructons The algorthms code s gven n the full paper I n s t r u c t o n s e+06 e Parallel IR Soluton Orgnal IR Loop Processors Fgure The results of runnng the OrdnaryIR algorthm for n=50,000 Useful Applcaton for the Ordnary IR Soluton Consder the followng recurrence: X[g()] := A[]X[f ()]+B[] Lemma Let there be two sets of functons f (x) and g (x) defned as follows: f (x) = ax+b c x+d,g (x)= ex+f g x+h k l then f (g (x)) = kx+l m x+n, where = m n a e b f The operaton s defned c d g h as follows for x matrces: A B = A f det(a) =0 AB Otherwse From lemma, also known as Moebus Transformaton, t follows that the values X[g()] :::X[g(n)] of the recurrence shown above, can be computed by the followng steps: Intalze all matrces wth approprate coeffcents: 0 M ::m ntalzed to 0 A[] B[] forall f::ng do n parallel M g() := C[] D[] Multply the matrces: for = tondo M g() := M f () M g() Calculate the values of X[g()] :::X[g(n)]: forall f::ng do n parallel X[g()] := m S[g()]+m m S[g()]+m where m m m m = M g() Note that snce step s an ordnary IR, we can replace t wth a call to OrdnaryIR(M; f; g;) (where s the modfed matrx multplcaton operaton from lemma ) Thus we transformed the recurrence nto an ordnary IR problem whch we already know how to solve We can also produce a parallel soluton to a slghtly more complcated recurrence of the followng form: X[g()] := X[g()] + A[]X[f ()]+B[] Snce g() s dstnct, we can rewrte the above recurrence by replacng the varable X[g()] on the rght hand of the 0 := 0 sgn, wth ts ntal value S[g()], wthout affectng the fnal values of X[g()] :::X[g(n)] Thssallowed snce the dstnctness property of g() guarantees us that each assgnment to X[g()] s the frst one, and therefore each reference to X[g()] s a reference to ts ntal value Thus we can brng the loop to ts Moebus form as follows: for = tondo X[g()] := (S[g()]C[]+A[])X[f ()]+(S[g()]D[]+B[])

4 producng the followng Moeubus matrces: 8 M g() = S[g()] C[] +A[] S[g()] D[] +B[] C[] D[] As an example consder the recurrence taken from loop number, of the Lvermore Loops benchmark [] The loop s a -D Implct Hydrodynamcs fragment: X[::n; ::7] ntalzed to S for j = to6do for = ton do X[; j] := X[; j] +0:75d0 (Y [] +X[,;j]Z[; j]); The nner loop can be vewed as an ordnary IR problem OrdnaryIR(M; f; g;) where g() =7(,)+j, f()= 7(,)+j, 8M g() = 0:75 Z[; j] S[g()] + 0:75 Y [] 0 and where s the operator from lemma Thus, wthout usng any data dependence analyss technques, we managed to parallelze the loop, to be calculated n O(log n) steps General Indexed Recurrences We now consder a more general case of IR equatons (called GIR) whch can be modeled by the loop: for = tondobegn A[g()] := A[f ()] A[h()]; The greedy method used for the IR case (where g() = h()) s not sutable for GIR Essentally, ths s due to the dfference n the structure of the trace A 0 [g()] n the two cases As depcted n fg, A 0 [g()] n the GIR case s a bnary tree, whereas n the IR case A 0 [g()] s a lst g()= f()= - h()= - GIR: A[] = A[-]A[-] A[6 ]= A[ 5]= A[ ]= A[ ]= A[ ]= A[ ]= A[ ]= g()= f()= - IR: A[] = A[-]A[] A[ 6]= A[ 6] A[ 5] A[ ] A[ ] Fgure Tree structure versus lst structure of the trace The tree structure of the trace mples that the operator must be a commutatve one Clearly, the multplcaton of traces values can be done ether from the left or from the rght end of a current trace value The other problem that a GIR loop presents us wth, s that traces can have an exponental length For example consder the loop 0 for = ::n A[] := A[, ] A[, ] 0,whereA[0]=A[]=aIn ths example the trace A 0 [n] = a n conssts of n multplcatons Therefore, n order for the parallelzaton of GIR loops to be effcent, the computaton of a power (A[] k ) must be regarded as atomc operaton Ths assumpton can also be found n prevous works (eg []) where the multplcaton operaton was used n order to solve recurrences of addtons The GIR algorthm must therefore gather all dentcal elements of a trace and then, usng the power operaton, compute ther product n a sngle operaton As an example, consder the above loop (A[] := A[,]A[,]), where A[0] and A[] have dfferent ntal values After the executon of the loop the trace s a multplcaton of two powers A 0 [] = A[0] fb(,) A[] fb(,),wherefb() s the th Fbonacc number Ths trace s thus, best computed by frst countng thepowersofa[0] and A[] n every trace separately (see fgure 5) Indeed countng powers s suffcent to compute the traces not only for the above loop, but for any GIR loops as well A [ ] A[ ] A[ 0 ] A [ ] A [ ] A [ ] A[ ] A[ ] A[ 0 ] A [ ] = A[ 0 ] A[ ] Fgure 5 The expanson of the recurrence X = X, X, for n = Countng all powers of A[] s elements can be done usng an ntal dependence graph G =< ;E >, showng dependences among the fnal values of A[] s elements The proposed algorthm computes the power of some element A[j] n a trace A 0 [] by countng the number of dfferent paths between correspondng nodes j and,n G Intutvely, each edge <;j>e of the dependence graph G ndcates that A[j] s an operand n the assgnment statement to A[] of thegir-loop Thus, the powerof A[j] n the trace of A 0 [] s n fact the number of dfferent paths leadng from j to n G Computng all powers n every trace s therefore equvalent to countng all paths (CAP) between the nodes of G The partcular varant of CAP needed for GIR-loops s defned as follows: Defnton Let S be the set of nodes wth n-degree 0 (the leaves or buttom nodes) of a DAG G =< ;E> Countngall the paths CAP(G)s an operaton that returns a labeled graph G 0 = < ;E 0 >such that an edge < ; j > [x], S; j S wth the label [x] belongs to G 0 ff there are exactly x paths from j to n G For example let G be a double chan of n nodes v,! v,! :::,! v n, such that there are two edges from v to v + In ths case G 0 = CAP(G) s a DAG such

5 that there s a sngle edge from v to every v of the form <v ;v > [ ] In order to solve a GIR loop we frst create the dependence graph G, and then computes all the paths n G n parallel G 0 = CAP(G ) G s constructed such that an edge < ;j > [x] E 0 ff the power of A[j] n the trace A 0 [] s exactly x Fnally, the trace of every element A 0 [] s obtaned by computng A 0 [] = A[j ] x :::A[j k ] xk where <;j l > [xl] CAP(G ) l = ;:::;k Thus, once we have the powers x ;:::;x k the trace can be computed n parallel n log k steps The dependence graph G = <;E >nduced by a GIR-loop s defned as follows: g();:::;g(n);f() 0 ;:::;f(n) 0 ;h() 00 ;:::h(n) 00 = where f() 0 (or h() 0 ) represent ntal values of A[] that wll form the trace of the g() nodes The edges n E nclude: for = ::n <g();f()> [] f there exsts j; j < such that g(j) =f() -Deletng marked edges - remove each marked edge from E t Ths step prevents us from recountng edges that were already taken under consderaton n prevous steps -Paths addton- For each node v replace all double edges <v ;v j > [x] ;:::;< v ;v j > [xk] E t wtha Pk sngle edge (labeled by ther sum) <v ;v j > l= xl : v x xk vj v Fgure 8 Summng double edges x m Two separate examples of the above algorthm operaton are gven n fg 9 The new edges added (by path multplcaton and path addton) n every teraton, are denoted by dashed lnes vj <g();h() > [] f there exsts j; j < such that g(j) =h() <g();f() 0 > [] f there s no j; j < such that g(j) =f() G <g();h() 00 > [] f there s no j; j < such that g(j) =h() For example, G of the loop A[] = A[,] A[,] 5 G 0 h() h() h() f() f() f() g() g() g() Fgure 9 Iteratons of two graphs Fgure 6 The dependence graph produced by the recurrence A = A, A, for = ; ; s gven n fg 6 Our algorthm for computng CAP(G) uses log n teratons (t = ;:::;log n), where n each teraton we update the edges of the current graph G t, =<;E t, >to form G t =<;E t >as follows: -E t = E t, -Paths multplcaton - For each <v ;v k > [x] E t and a successve edge <v k ;v j > [y] E t,weaddanew edge <v ;v j > [xy] to E t and mark <v k ;v j > [y] to be deleted: x y x x y k j k Fgure 7 Paths multplcaton y j The full algorthm along wth a verson whch avods spawnng unnecessary processes, and a method for handlng GIR wth non-dstnct g, are descrbed n the full paper References [] John T Feo, "An analyss of the computatonal and parallel complexty of the Lvermore Loops", Journal of Parallel Computng No7, 988, pp 6-85 [] H S Stone, "An effcent Parallel Algorthm for the Soluton of a Trdagonal Lnear System of equatons", J ACM 0,7 (97) [] J Jaja, "An Introducton to parallel algorthms", Addson- Wesley publshng company, 99 [] P M Kogge, H S Stone, "A Parallel Algorthm for the Effcent Soluton of a General Class of Recurrence Equatons", IEEE Transactons on Computers, C(8):786-79, August 97 [5] G Haber, Y Ben-Asher, "On the Usage of smulators to detect neffcency of parallel programs caused by "bad" schedulngs: the SIMPARC approach", Accepted for publcaton n the Journal of Systems and Software 5

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume

More information

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005 Exercses (Part 4) Introducton to R UCLA/CCPR John Fox, February 2005 1. A challengng problem: Iterated weghted least squares (IWLS) s a standard method of fttng generalzed lnear models to data. As descrbed

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

CS1100 Introduction to Programming

CS1100 Introduction to Programming Factoral (n) Recursve Program fact(n) = n*fact(n-) CS00 Introducton to Programmng Recurson and Sortng Madhu Mutyam Department of Computer Scence and Engneerng Indan Insttute of Technology Madras nt fact

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Loop Transformations, Dependences, and Parallelization

Loop Transformations, Dependences, and Parallelization Loop Transformatons, Dependences, and Parallelzaton Announcements Mdterm s Frday from 3-4:15 n ths room Today Semester long project Data dependence recap Parallelsm and storage tradeoff Scalar expanson

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Brave New World Pseudocode Reference

Brave New World Pseudocode Reference Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be

More information

Floating-Point Division Algorithms for an x86 Microprocessor with a Rectangular Multiplier

Floating-Point Division Algorithms for an x86 Microprocessor with a Rectangular Multiplier Floatng-Pont Dvson Algorthms for an x86 Mcroprocessor wth a Rectangular Multpler Mchael J. Schulte Dmtr Tan Carl E. Lemonds Unversty of Wsconsn Advanced Mcro Devces Advanced Mcro Devces Schulte@engr.wsc.edu

More information

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES

A SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES A SYSOLIC APPROACH O LOOP PARIIONING AND MAPPING INO FIXED SIZE DISRIBUED MEMORY ARCHIECURES Ioanns Drosts, Nektaros Kozrs, George Papakonstantnou and Panayots sanakas Natonal echncal Unversty of Athens

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

UNIT 2 : INEQUALITIES AND CONVEX SETS

UNIT 2 : INEQUALITIES AND CONVEX SETS UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

CHAPTER 10: ALGORITHM DESIGN TECHNIQUES

CHAPTER 10: ALGORITHM DESIGN TECHNIQUES CHAPTER 10: ALGORITHM DESIGN TECHNIQUES So far, we have been concerned wth the effcent mplementaton of algorthms. We have seen that when an algorthm s gven, the actual data structures need not be specfed.

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Algorithm To Convert A Decimal To A Fraction

Algorithm To Convert A Decimal To A Fraction Algorthm To Convert A ecmal To A Fracton by John Kennedy Mathematcs epartment Santa Monca College 1900 Pco Blvd. Santa Monca, CA 90405 jrkennedy6@gmal.com Except for ths comment explanng that t s blank

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

such that is accepted of states in , where Finite Automata Lecture 2-1: Regular Languages be an FA. A string is the transition function,

such that is accepted of states in , where Finite Automata Lecture 2-1: Regular Languages be an FA. A string is the transition function, * Lecture - Regular Languages S Lecture - Fnte Automata where A fnte automaton s a -tuple s a fnte set called the states s a fnte set called the alphabet s the transton functon s the ntal state s the set

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Desgn and Analyss of Algorthms Heaps and Heapsort Reference: CLRS Chapter 6 Topcs: Heaps Heapsort Prorty queue Huo Hongwe Recap and overvew The story so far... Inserton sort runnng tme of Θ(n 2 ); sorts

More information

Line Clipping by Convex and Nonconvex Polyhedra in E 3

Line Clipping by Convex and Nonconvex Polyhedra in E 3 Lne Clppng by Convex and Nonconvex Polyhedra n E 3 Václav Skala 1 Department of Informatcs and Computer Scence Unversty of West Bohema Unverztní 22, Box 314, 306 14 Plzeò Czech Republc e-mal: skala@kv.zcu.cz

More information

Today Using Fourier-Motzkin elimination for code generation Using Fourier-Motzkin elimination for determining schedule constraints

Today Using Fourier-Motzkin elimination for code generation Using Fourier-Motzkin elimination for determining schedule constraints Fourer Motzkn Elmnaton Logstcs HW10 due Frday Aprl 27 th Today Usng Fourer-Motzkn elmnaton for code generaton Usng Fourer-Motzkn elmnaton for determnng schedule constrants Unversty Fourer-Motzkn Elmnaton

More information

Loop Permutation. Loop Transformations for Parallelism & Locality. Legality of Loop Interchange. Loop Interchange (cont)

Loop Permutation. Loop Transformations for Parallelism & Locality. Legality of Loop Interchange. Loop Interchange (cont) Loop Transformatons for Parallelsm & Localty Prevously Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Loop nterchange Loop transformatons and transformaton frameworks

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Polyhedral Compilation Foundations

Polyhedral Compilation Foundations Polyhedral Complaton Foundatons Lous-Noël Pouchet pouchet@cse.oho-state.edu Dept. of Computer Scence and Engneerng, the Oho State Unversty Feb 8, 200 888., Class # Introducton: Polyhedral Complaton Foundatons

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

$OJRULWKPV. (Feodor F. Dragan) Department of Computer Science Kent State University

$OJRULWKPV. (Feodor F. Dragan) Department of Computer Science Kent State University $GYDQF $OJRULWKPV (Feodor F. Dragan) Department of Computer Scence Kent State Unversty Advanced Algorthms, Feodor F. Dragan, Kent State Unversty Textbook: Thomas Cormen, Charles Lesterson, Ronald Rvest,

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

CS221: Algorithms and Data Structures. Priority Queues and Heaps. Alan J. Hu (Borrowing slides from Steve Wolfman)

CS221: Algorithms and Data Structures. Priority Queues and Heaps. Alan J. Hu (Borrowing slides from Steve Wolfman) CS: Algorthms and Data Structures Prorty Queues and Heaps Alan J. Hu (Borrowng sldes from Steve Wolfman) Learnng Goals After ths unt, you should be able to: Provde examples of approprate applcatons for

More information

An Efficient Label Setting/Correcting Shortest Path Algorithm

An Efficient Label Setting/Correcting Shortest Path Algorithm An Effcent Label Settng/Correctng Shortest Path Algorthm Antono Sedeño-Noda, Carlos González-Martín Departamento de Estadístca, Investgacón Operatva y Computacón (DEIOC) Unversdad de La Laguna,38205- La

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Active Contours/Snakes

Active Contours/Snakes Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

Loop Transformations for Parallelism & Locality. Review. Scalar Expansion. Scalar Expansion: Motivation

Loop Transformations for Parallelism & Locality. Review. Scalar Expansion. Scalar Expansion: Motivation Loop Transformatons for Parallelsm & Localty Last week Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Scalar expanson for removng false dependences Loop nterchange Loop

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

A Heuristic for Mining Association Rules In Polynomial Time*

A Heuristic for Mining Association Rules In Polynomial Time* Complete reference nformaton: Ylmaz, E., E. Trantaphyllou, J. Chen, and T.W. Lao, (3), A Heurstc for Mnng Assocaton Rules In Polynomal Tme, Computer and Mathematcal Modellng, No. 37, pp. 9-33. A Heurstc

More information

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Reading. 14. Subdivision curves. Recommended:

Reading. 14. Subdivision curves. Recommended: eadng ecommended: Stollntz, Deose, and Salesn. Wavelets for Computer Graphcs: heory and Applcatons, 996, secton 6.-6., A.5. 4. Subdvson curves Note: there s an error n Stollntz, et al., secton A.5. Equaton

More information

Communication-Minimal Partitioning and Data Alignment for Af"ne Nested Loops

Communication-Minimal Partitioning and Data Alignment for Afne Nested Loops Communcaton-Mnmal Parttonng and Data Algnment for Af"ne Nested Loops HYUK-JAE LEE 1 AND JOSÉ A. B. FORTES 2 1 Department of Computer Scence, Lousana Tech Unversty, Ruston, LA 71272, USA 2 School of Electrcal

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Gaussian elimination. System of Linear Equations. Gaussian elimination. System of Linear Equations

Gaussian elimination. System of Linear Equations. Gaussian elimination. System of Linear Equations Jord Cortadella Department of Computer Scence Introducton to Programmng Dept. CS, UPC 2 An essental algorthm n Lnear Algebra wth multple applcatons: Solvng lnear systems of equatons Fndng the nverse of

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Preconditioning Parallel Sparse Iterative Solvers for Circuit Simulation

Preconditioning Parallel Sparse Iterative Solvers for Circuit Simulation Precondtonng Parallel Sparse Iteratve Solvers for Crcut Smulaton A. Basermann, U. Jaekel, and K. Hachya 1 Introducton One mportant mathematcal problem n smulaton of large electrcal crcuts s the soluton

More information

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example Unversty of Brtsh Columba CPSC, Intro to Computaton Jan-Apr Tamara Munzner News Assgnment correctons to ASCIIArtste.java posted defntely read WebCT bboards Arrays Lecture, Tue Feb based on sldes by Kurt

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information