Parallel Solutions of Indexed Recurrence Equations
|
|
- Lorin Townsend
- 5 years ago
- Views:
Transcription
1 Parallel Solutons of Indexed Recurrence Equatons Yos Ben-Asher Dep of Math and CS Hafa Unversty 905 Hafa, Israel Gad Haber IBM Scence and Technology 905 Hafa, Israel Abstract A new type of recurrence equatons called ndexed recurrences (IR) s defned, n whch the common noton of X[] = op(x[];x[,]) = :::ns generalzed to X[g()] = op(x[f()];x[h()]) f; g; h : f:::ng7! f:::mg Ths enables us to model sequental loops of the form X[g()] := op(x[f ()];X[h()]; ) as IR equatons Thus, a parallel algorthm that solves a set of IR equatons s n fact a way to transform sequental loops nto parallel ones Note that the crcut evaluaton problem (CP) can also be expressed as a set of IR equatons Therefore an effcent parallel soluton to the general IR problem s not lkely to be found, as such soluton would also solve the CP, showng that P NC In ths paper we ntroduce parallel algorthms for two varants of the IR equatons problem: An O(log n) greedy algorthm for solvng IR equatons where g() s dstnct and h() = g() usng O(n) processors An O(log n) algorthm wth no restrcton on f; g or h, usng up to O(n ) processors However, we show that for general IR, op must be commutatve so that a parallel computaton can be used Introducton We consder a certan generalzaton of ordnary recurrence equatons called ndexed recurrence (IR) equatons Gven an ntalzed array A[::m], asetofn IR equatons have the form A[g()] := op(a[f()];a[h()]) whch can be represented by a sequental loop of the form A[g()] := op(a[f ()];A[h()]); where op s a bnary assocatve operator and where f; g : f::ng 7!f::mg do not nclude references to elements of the A[] array tself The goal s to use the parallel solutons of these IR equatons n order to parallelze sequental loops whose executon can be smulated by a set of IR equatons Ths s smlar to the way that parallel solutons of lnear recurrences (A[] = op(a[, ];A[])) are used to parallelze sequental loops [] of the form: A[] := op(a[, ];A[]); In our work, we analyzed the well known Lvermore Loops [] and checked how many of them ft nto the general frame of IR equatons n compare to ordnary recurrence equatons There are loops n ths code, often used as a benchmark for parallelzng complers, and contan typcal code for scentfc computng Out of the loops we found that: loops,7,8,,5,6, do not contan recurrences of any type; loops,5,,9 contan lnear recurrences; all other loops (except for,0,) contan ndexed recurrences Ordnary Indexed Recurrences Ths secton descrbes the parallel algorthm for computng a set of IR equatons where g() s dstnct and h() = g() Ths case s smpler than the general one, and the parallel algorthm we obtan s more effcent than the one for the general case, and uses O(n) processors It s easy to begn wth the sequental algorthm namely, the followng loop: Array A[::m] wth ntal values; A[g()] := A[f ()] A[g()]; For convenence, we have replaced the notaton of op(x; y) wth x y, where s the sutable bnary and assocatve operaton Note that op s not necessarly a commutatve operaton, therefore our algorthm should preserve the multplcatons order (e the order of operatons)
2 for = to n do A[] := A[ + ] A[]; After 8 teratons: A 0 [] =A[] A 0 [5]=A[5] A 0 []=A[]A[] A 0 [6]=A[]A[]A[6] A 0 []=A[] A 0 [7]=A[7] A 0 []=A[]A[] A 0 [8]=A[5]A[8] Fgure An example of an Ordnary IR loop The above loop can be vewed as a functon for computng a new value A 0 = F (A; n; f; g) (also denoted as OrdnaryIR(A; f; g; )) where A s the ntal array and A 0 s the array after executng the loop We therefore need to fnd a parallel algorthm that computes F (A; n; f; g) n less than n steps Ths s analogous to the way n whch prefx-sum [] s used to solve ordnary recurrence equatons F (A; op(x; y)) = prefx-sum(a; op(x; y)) The value of A 0 [g()] s a product of a subset of elements n A As an example consder the loop n fg where n every teraton, A[] s updated by A[ + ] A[] Some of the elements A 0 [] preserve ther ntal values, eg A 0 [7] =A[7](snce there s no n such that g() =7) Whle the trace of other A 0 [] contan the multplcatons of several elements, eg A 0 [6] =A[]A[]A[6](snce g() =6;f()=, and then g() =f()and f () =) Fnally, A[] s the last tem n the trace of A 0 [6] snce there s no < such that g() =f() The sequence of multplcatons of every element n A 0 [] (also called the trace of A[g()]) s gven by the followng lemma: Lemma Let A 0 [] denote the value of A[] after the executon of the loop for = ;:::;ndoa[g()] = A[f ()] A[g()] then for all = :::n such that: j = A 0 [g()] = A[f (j k)] :::A[f(j)] A[g()] for t = :::kthe ndces j t satsfy that j t <j t, and g(j t )=f(j t, ) j k s the last ndex for whch g(j t )=f(j t, ), e, there s no j k+ < j k such that g(j k+ ) = f(j k ) Lemma suggests a smple method for computng A 0 [g()] n parallel Let A,t [g()] denote the sub-trace wth t + rghtmost elements n the trace of A 0 [g()], e, A,t [g()] = A[f (j k,t)] :::A[f()] A[g()] Consder the concatenaton (or multplcaton ) of two successve sub-traces: A,(t +t ) [g()] = A,t [g(j)] A,t [g()] where g(j) =f(j k,t )and A[f (j k,t )] s the last element n A,t [g()] Note that A[g(j)] s multpled twce, once as A[g(j)] and once as A[f(j k,t )] Ths can be corrected by takng the trace of ts predecessor A,t [f(j)] so that A,(t +t ) [g()] = A,t [f (j)] A,t [g()] = A[f (j 0 k,t )] :::A[f(j)] A[f (j 0 k,t )] :::A[g()] = A[f (j 0 k,t )] :::A[g(j 0 )] A[g(j)] :::A[g()] where j 0 <jand j 0 s the teraton number n whch A[f(j)] s last updated n the loop The proposed algorthm s a smple greedy algorthm that keeps teratng untl all traces are completed, where n each teraton all possble concatenatons of successve sub-traces are computed n parallel Thus, ntally, we can compute n parallel the frst product of each trace A[g()] = A[f ()] A[g()] (for all = ;:::;n) The concatenaton operaton of two successve sub-traces A,t [g(j)];a,t [g(j)] can be mplemented usng that: the value of a sub-trace A,t [g()] s stored n ts array element A[g()] a ponter N [g()] ponts to the sub-trace A,t [g(j)] to be concatenated to A,t [g()] (to form A,(t+t) [g()]) Hence, A[N [g()]] contans the value of the sub-trace A,t [g(j)] Intally all traces are of length, and can be computed n parallel The code for a concatenaton step of future teratons s therefore as follows: multplcaton- A[g()] = A,(t+t) [g()] = A[N [g()]] A[g()] ponter updatng- N [g()],(t+t) = N [N [g()]], where N [;:::;m]s ntalzed as follows: N [x] = f() 9, n and g() =x 0 Otherwse Snce we start wth traces of length, then for each = ::n N [g()] = N [N [g()]] The way n whch the concatenaton operaton works s depcted n fg showng two parallel concatenatons of sub-traces The operaton N [g()],(t+t) = N [N [g()]] s depcted by the fact that the next-ponter of a new trace s taken to be that of the joned trace The algorthm performs log n teratons In each teraton, the above concatenaton operaton (the multplcaton followed by the updatng)s performed n parallel for all traces A 0 [g()] As a result, n each teraton, ether a trace s fully computed or the number
3 -5 A[9] A[8] A[7] A[6] A[5] A[] A[] A[] A[] A[0] A[9] - A[7] - A[] - A [8] - A[9] A[8] A[7] A[6] A[5] A[] A[] A[] A[] A[0] A[9] A [8] -6 Ths s not an ordnary IR recurrence due to the nonassocatve nature of the operators f (x) = ax+b c x+d (where = ; ;:::n) However, we can transform the recurrence nto an ordnary IR problem by explotng a useful qualty of these operators as shown n the followng theorem Fgure The concatenaton operaton of two traces of elements n the product of a trace s doubled due to the multplcaton A,(t +t ) [g()] = A,t [g(j)] A,t [g()]: Hence, log n teratons are suffcent Clearly, once a trace has been completed (fully computed) we must not contnue to concatenate any more traces to t It therefore remans to determne when the computaton of a trace has completed In general, n every teraton and for every trace stored n A[g()], the algorthm must determne: the exstence of A[g(j)] such that ts trace can be concatenated to the trace of A[g()] f the computaton of the trace of A[g()] s completed, then no more redundant traces should be added to t A more effcent verson of the algorthm whch forks only up to P processes at the same tme, was programmed and tested on the SmParC [5] smulator Hence, ths verson complexty s T (n; P ) = n log n Fgure shows the P results obtaned for an array of sze n = 50; 000 and for P = #processors << n The Y axs represents the complexty n unts of assembly nstructons The algorthms code s gven n the full paper I n s t r u c t o n s e+06 e Parallel IR Soluton Orgnal IR Loop Processors Fgure The results of runnng the OrdnaryIR algorthm for n=50,000 Useful Applcaton for the Ordnary IR Soluton Consder the followng recurrence: X[g()] := A[]X[f ()]+B[] Lemma Let there be two sets of functons f (x) and g (x) defned as follows: f (x) = ax+b c x+d,g (x)= ex+f g x+h k l then f (g (x)) = kx+l m x+n, where = m n a e b f The operaton s defned c d g h as follows for x matrces: A B = A f det(a) =0 AB Otherwse From lemma, also known as Moebus Transformaton, t follows that the values X[g()] :::X[g(n)] of the recurrence shown above, can be computed by the followng steps: Intalze all matrces wth approprate coeffcents: 0 M ::m ntalzed to 0 A[] B[] forall f::ng do n parallel M g() := C[] D[] Multply the matrces: for = tondo M g() := M f () M g() Calculate the values of X[g()] :::X[g(n)]: forall f::ng do n parallel X[g()] := m S[g()]+m m S[g()]+m where m m m m = M g() Note that snce step s an ordnary IR, we can replace t wth a call to OrdnaryIR(M; f; g;) (where s the modfed matrx multplcaton operaton from lemma ) Thus we transformed the recurrence nto an ordnary IR problem whch we already know how to solve We can also produce a parallel soluton to a slghtly more complcated recurrence of the followng form: X[g()] := X[g()] + A[]X[f ()]+B[] Snce g() s dstnct, we can rewrte the above recurrence by replacng the varable X[g()] on the rght hand of the 0 := 0 sgn, wth ts ntal value S[g()], wthout affectng the fnal values of X[g()] :::X[g(n)] Thssallowed snce the dstnctness property of g() guarantees us that each assgnment to X[g()] s the frst one, and therefore each reference to X[g()] s a reference to ts ntal value Thus we can brng the loop to ts Moebus form as follows: for = tondo X[g()] := (S[g()]C[]+A[])X[f ()]+(S[g()]D[]+B[])
4 producng the followng Moeubus matrces: 8 M g() = S[g()] C[] +A[] S[g()] D[] +B[] C[] D[] As an example consder the recurrence taken from loop number, of the Lvermore Loops benchmark [] The loop s a -D Implct Hydrodynamcs fragment: X[::n; ::7] ntalzed to S for j = to6do for = ton do X[; j] := X[; j] +0:75d0 (Y [] +X[,;j]Z[; j]); The nner loop can be vewed as an ordnary IR problem OrdnaryIR(M; f; g;) where g() =7(,)+j, f()= 7(,)+j, 8M g() = 0:75 Z[; j] S[g()] + 0:75 Y [] 0 and where s the operator from lemma Thus, wthout usng any data dependence analyss technques, we managed to parallelze the loop, to be calculated n O(log n) steps General Indexed Recurrences We now consder a more general case of IR equatons (called GIR) whch can be modeled by the loop: for = tondobegn A[g()] := A[f ()] A[h()]; The greedy method used for the IR case (where g() = h()) s not sutable for GIR Essentally, ths s due to the dfference n the structure of the trace A 0 [g()] n the two cases As depcted n fg, A 0 [g()] n the GIR case s a bnary tree, whereas n the IR case A 0 [g()] s a lst g()= f()= - h()= - GIR: A[] = A[-]A[-] A[6 ]= A[ 5]= A[ ]= A[ ]= A[ ]= A[ ]= A[ ]= g()= f()= - IR: A[] = A[-]A[] A[ 6]= A[ 6] A[ 5] A[ ] A[ ] Fgure Tree structure versus lst structure of the trace The tree structure of the trace mples that the operator must be a commutatve one Clearly, the multplcaton of traces values can be done ether from the left or from the rght end of a current trace value The other problem that a GIR loop presents us wth, s that traces can have an exponental length For example consder the loop 0 for = ::n A[] := A[, ] A[, ] 0,whereA[0]=A[]=aIn ths example the trace A 0 [n] = a n conssts of n multplcatons Therefore, n order for the parallelzaton of GIR loops to be effcent, the computaton of a power (A[] k ) must be regarded as atomc operaton Ths assumpton can also be found n prevous works (eg []) where the multplcaton operaton was used n order to solve recurrences of addtons The GIR algorthm must therefore gather all dentcal elements of a trace and then, usng the power operaton, compute ther product n a sngle operaton As an example, consder the above loop (A[] := A[,]A[,]), where A[0] and A[] have dfferent ntal values After the executon of the loop the trace s a multplcaton of two powers A 0 [] = A[0] fb(,) A[] fb(,),wherefb() s the th Fbonacc number Ths trace s thus, best computed by frst countng thepowersofa[0] and A[] n every trace separately (see fgure 5) Indeed countng powers s suffcent to compute the traces not only for the above loop, but for any GIR loops as well A [ ] A[ ] A[ 0 ] A [ ] A [ ] A [ ] A[ ] A[ ] A[ 0 ] A [ ] = A[ 0 ] A[ ] Fgure 5 The expanson of the recurrence X = X, X, for n = Countng all powers of A[] s elements can be done usng an ntal dependence graph G =< ;E >, showng dependences among the fnal values of A[] s elements The proposed algorthm computes the power of some element A[j] n a trace A 0 [] by countng the number of dfferent paths between correspondng nodes j and,n G Intutvely, each edge <;j>e of the dependence graph G ndcates that A[j] s an operand n the assgnment statement to A[] of thegir-loop Thus, the powerof A[j] n the trace of A 0 [] s n fact the number of dfferent paths leadng from j to n G Computng all powers n every trace s therefore equvalent to countng all paths (CAP) between the nodes of G The partcular varant of CAP needed for GIR-loops s defned as follows: Defnton Let S be the set of nodes wth n-degree 0 (the leaves or buttom nodes) of a DAG G =< ;E> Countngall the paths CAP(G)s an operaton that returns a labeled graph G 0 = < ;E 0 >such that an edge < ; j > [x], S; j S wth the label [x] belongs to G 0 ff there are exactly x paths from j to n G For example let G be a double chan of n nodes v,! v,! :::,! v n, such that there are two edges from v to v + In ths case G 0 = CAP(G) s a DAG such
5 that there s a sngle edge from v to every v of the form <v ;v > [ ] In order to solve a GIR loop we frst create the dependence graph G, and then computes all the paths n G n parallel G 0 = CAP(G ) G s constructed such that an edge < ;j > [x] E 0 ff the power of A[j] n the trace A 0 [] s exactly x Fnally, the trace of every element A 0 [] s obtaned by computng A 0 [] = A[j ] x :::A[j k ] xk where <;j l > [xl] CAP(G ) l = ;:::;k Thus, once we have the powers x ;:::;x k the trace can be computed n parallel n log k steps The dependence graph G = <;E >nduced by a GIR-loop s defned as follows: g();:::;g(n);f() 0 ;:::;f(n) 0 ;h() 00 ;:::h(n) 00 = where f() 0 (or h() 0 ) represent ntal values of A[] that wll form the trace of the g() nodes The edges n E nclude: for = ::n <g();f()> [] f there exsts j; j < such that g(j) =f() -Deletng marked edges - remove each marked edge from E t Ths step prevents us from recountng edges that were already taken under consderaton n prevous steps -Paths addton- For each node v replace all double edges <v ;v j > [x] ;:::;< v ;v j > [xk] E t wtha Pk sngle edge (labeled by ther sum) <v ;v j > l= xl : v x xk vj v Fgure 8 Summng double edges x m Two separate examples of the above algorthm operaton are gven n fg 9 The new edges added (by path multplcaton and path addton) n every teraton, are denoted by dashed lnes vj <g();h() > [] f there exsts j; j < such that g(j) =h() <g();f() 0 > [] f there s no j; j < such that g(j) =f() G <g();h() 00 > [] f there s no j; j < such that g(j) =h() For example, G of the loop A[] = A[,] A[,] 5 G 0 h() h() h() f() f() f() g() g() g() Fgure 9 Iteratons of two graphs Fgure 6 The dependence graph produced by the recurrence A = A, A, for = ; ; s gven n fg 6 Our algorthm for computng CAP(G) uses log n teratons (t = ;:::;log n), where n each teraton we update the edges of the current graph G t, =<;E t, >to form G t =<;E t >as follows: -E t = E t, -Paths multplcaton - For each <v ;v k > [x] E t and a successve edge <v k ;v j > [y] E t,weaddanew edge <v ;v j > [xy] to E t and mark <v k ;v j > [y] to be deleted: x y x x y k j k Fgure 7 Paths multplcaton y j The full algorthm along wth a verson whch avods spawnng unnecessary processes, and a method for handlng GIR wth non-dstnct g, are descrbed n the full paper References [] John T Feo, "An analyss of the computatonal and parallel complexty of the Lvermore Loops", Journal of Parallel Computng No7, 988, pp 6-85 [] H S Stone, "An effcent Parallel Algorthm for the Soluton of a Trdagonal Lnear System of equatons", J ACM 0,7 (97) [] J Jaja, "An Introducton to parallel algorthms", Addson- Wesley publshng company, 99 [] P M Kogge, H S Stone, "A Parallel Algorthm for the Effcent Soluton of a General Class of Recurrence Equatons", IEEE Transactons on Computers, C(8):786-79, August 97 [5] G Haber, Y Ben-Asher, "On the Usage of smulators to detect neffcency of parallel programs caused by "bad" schedulngs: the SIMPARC approach", Accepted for publcaton n the Journal of Systems and Software 5
CMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationSequential search. Building Java Programs Chapter 13. Sequential search. Sequential search
Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationData Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach
Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer
More informationChapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward
More informationKent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming
CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems
More informationCE 221 Data Structures and Algorithms
CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume
More informationExercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005
Exercses (Part 4) Introducton to R UCLA/CCPR John Fox, February 2005 1. A challengng problem: Iterated weghted least squares (IWLS) s a standard method of fttng generalzed lnear models to data. As descrbed
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationCS1100 Introduction to Programming
Factoral (n) Recursve Program fact(n) = n*fact(n-) CS00 Introducton to Programmng Recurson and Sortng Madhu Mutyam Department of Computer Scence and Engneerng Indan Insttute of Technology Madras nt fact
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationTransaction-Consistent Global Checkpoints in a Distributed Database System
Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationLoop Transformations, Dependences, and Parallelization
Loop Transformatons, Dependences, and Parallelzaton Announcements Mdterm s Frday from 3-4:15 n ths room Today Semester long project Data dependence recap Parallelsm and storage tradeoff Scalar expanson
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationBrave New World Pseudocode Reference
Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be
More informationFloating-Point Division Algorithms for an x86 Microprocessor with a Rectangular Multiplier
Floatng-Pont Dvson Algorthms for an x86 Mcroprocessor wth a Rectangular Multpler Mchael J. Schulte Dmtr Tan Carl E. Lemonds Unversty of Wsconsn Advanced Mcro Devces Advanced Mcro Devces Schulte@engr.wsc.edu
More informationSENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR
SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationOptimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming
Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered
More informationCSCI 104 Sorting Algorithms. Mark Redekopp David Kempe
CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationSorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions
Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationAccounting for the Use of Different Length Scale Factors in x, y and z Directions
1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationA SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES
A SYSOLIC APPROACH O LOOP PARIIONING AND MAPPING INO FIXED SIZE DISRIBUED MEMORY ARCHIECURES Ioanns Drosts, Nektaros Kozrs, George Papakonstantnou and Panayots sanakas Natonal echncal Unversty of Athens
More informationArray transposition in CUDA shared memory
Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationUNIT 2 : INEQUALITIES AND CONVEX SETS
UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces
More informationA fault tree analysis strategy using binary decision diagrams
Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationAMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain
AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationCHAPTER 10: ALGORITHM DESIGN TECHNIQUES
CHAPTER 10: ALGORITHM DESIGN TECHNIQUES So far, we have been concerned wth the effcent mplementaton of algorthms. We have seen that when an algorthm s gven, the actual data structures need not be specfed.
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationAlgorithm To Convert A Decimal To A Fraction
Algorthm To Convert A ecmal To A Fracton by John Kennedy Mathematcs epartment Santa Monca College 1900 Pco Blvd. Santa Monca, CA 90405 jrkennedy6@gmal.com Except for ths comment explanng that t s blank
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationsuch that is accepted of states in , where Finite Automata Lecture 2-1: Regular Languages be an FA. A string is the transition function,
* Lecture - Regular Languages S Lecture - Fnte Automata where A fnte automaton s a -tuple s a fnte set called the states s a fnte set called the alphabet s the transton functon s the ntal state s the set
More informationOptimal Workload-based Weighted Wavelet Synopses
Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,
More informationDesign and Analysis of Algorithms
Desgn and Analyss of Algorthms Heaps and Heapsort Reference: CLRS Chapter 6 Topcs: Heaps Heapsort Prorty queue Huo Hongwe Recap and overvew The story so far... Inserton sort runnng tme of Θ(n 2 ); sorts
More informationLine Clipping by Convex and Nonconvex Polyhedra in E 3
Lne Clppng by Convex and Nonconvex Polyhedra n E 3 Václav Skala 1 Department of Informatcs and Computer Scence Unversty of West Bohema Unverztní 22, Box 314, 306 14 Plzeò Czech Republc e-mal: skala@kv.zcu.cz
More informationToday Using Fourier-Motzkin elimination for code generation Using Fourier-Motzkin elimination for determining schedule constraints
Fourer Motzkn Elmnaton Logstcs HW10 due Frday Aprl 27 th Today Usng Fourer-Motzkn elmnaton for code generaton Usng Fourer-Motzkn elmnaton for determnng schedule constrants Unversty Fourer-Motzkn Elmnaton
More informationLoop Permutation. Loop Transformations for Parallelism & Locality. Legality of Loop Interchange. Loop Interchange (cont)
Loop Transformatons for Parallelsm & Localty Prevously Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Loop nterchange Loop transformatons and transformaton frameworks
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationPolyhedral Compilation Foundations
Polyhedral Complaton Foundatons Lous-Noël Pouchet pouchet@cse.oho-state.edu Dept. of Computer Scence and Engneerng, the Oho State Unversty Feb 8, 200 888., Class # Introducton: Polyhedral Complaton Foundatons
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More information$OJRULWKPV. (Feodor F. Dragan) Department of Computer Science Kent State University
$GYDQF $OJRULWKPV (Feodor F. Dragan) Department of Computer Scence Kent State Unversty Advanced Algorthms, Feodor F. Dragan, Kent State Unversty Textbook: Thomas Cormen, Charles Lesterson, Ronald Rvest,
More informationSolutions to Programming Assignment Five Interpolation and Numerical Differentiation
College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent
More informationParallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum
More informationCS221: Algorithms and Data Structures. Priority Queues and Heaps. Alan J. Hu (Borrowing slides from Steve Wolfman)
CS: Algorthms and Data Structures Prorty Queues and Heaps Alan J. Hu (Borrowng sldes from Steve Wolfman) Learnng Goals After ths unt, you should be able to: Provde examples of approprate applcatons for
More informationAn Efficient Label Setting/Correcting Shortest Path Algorithm
An Effcent Label Settng/Correctng Shortest Path Algorthm Antono Sedeño-Noda, Carlos González-Martín Departamento de Estadístca, Investgacón Operatva y Computacón (DEIOC) Unversdad de La Laguna,38205- La
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationRange images. Range image registration. Examples of sampling patterns. Range images and range surfaces
Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationActive Contours/Snakes
Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng
More informationHarvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)
Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst
More informationNAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics
Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson
More informationLoop Transformations for Parallelism & Locality. Review. Scalar Expansion. Scalar Expansion: Motivation
Loop Transformatons for Parallelsm & Localty Last week Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Scalar expanson for removng false dependences Loop nterchange Loop
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationA Heuristic for Mining Association Rules In Polynomial Time*
Complete reference nformaton: Ylmaz, E., E. Trantaphyllou, J. Chen, and T.W. Lao, (3), A Heurstc for Mnng Assocaton Rules In Polynomal Tme, Computer and Mathematcal Modellng, No. 37, pp. 9-33. A Heurstc
More informationAn Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem
An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationReading. 14. Subdivision curves. Recommended:
eadng ecommended: Stollntz, Deose, and Salesn. Wavelets for Computer Graphcs: heory and Applcatons, 996, secton 6.-6., A.5. 4. Subdvson curves Note: there s an error n Stollntz, et al., secton A.5. Equaton
More informationCommunication-Minimal Partitioning and Data Alignment for Af"ne Nested Loops
Communcaton-Mnmal Parttonng and Data Algnment for Af"ne Nested Loops HYUK-JAE LEE 1 AND JOSÉ A. B. FORTES 2 1 Department of Computer Scence, Lousana Tech Unversty, Ruston, LA 71272, USA 2 School of Electrcal
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationGaussian elimination. System of Linear Equations. Gaussian elimination. System of Linear Equations
Jord Cortadella Department of Computer Scence Introducton to Programmng Dept. CS, UPC 2 An essental algorthm n Lnear Algebra wth multple applcatons: Solvng lnear systems of equatons Fndng the nverse of
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationPreconditioning Parallel Sparse Iterative Solvers for Circuit Simulation
Precondtonng Parallel Sparse Iteratve Solvers for Crcut Smulaton A. Basermann, U. Jaekel, and K. Hachya 1 Introducton One mportant mathematcal problem n smulaton of large electrcal crcuts s the soluton
More informationNews. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example
Unversty of Brtsh Columba CPSC, Intro to Computaton Jan-Apr Tamara Munzner News Assgnment correctons to ASCIIArtste.java posted defntely read WebCT bboards Arrays Lecture, Tue Feb based on sldes by Kurt
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More information