Locating Software Faults Based on Control Flow and Data Dependence
|
|
- Blaise Walters
- 5 years ago
- Views:
Transcription
1 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER Locatng Software Faults Based on Control Flow and Data Dependence Chenghu Hu Lab of Intellgent Computng and Software Engneerng Zhejang Sc-Tech Unversty Hangzhou Zhejang, , Chna Emal: Zuohua Dng Lab of Intellgent Computng and Software Engneerng Zhejang Sc-Tech Unversty Hangzhou Zhejang, , Chna Emal: Abstract Debuggng software s a dffcult and tmeconsumng work. Fault localzaton technques are becomng extremely mportant. Coverage Based Fault Localzaton (CBFL) s very commonly used n fault locaton technque. Tarantula s a typcal one. It uses the coverage statstcs of faled executon paths and passed executon paths to calculate the suspcousness n the software. However, snce ths technque gnores the data dependency, t s hard to fnd the bugs whch are not n the suspcous code area but have data dependence wth t. In order to mprove the effcency of fault locatng, we combne control flow coverage nformaton and data dependence from program slcng. We valdate our approach expermentally usng Semens benchmark programs. The expermental results show that our approach s more effectve than Tarantula. Index Terms Fault locaton, Control flow, Program slcng,data dependence I. INTRODUCTION As the scope and complexty of software become ncreasngly tremendous, t s an ncreasngly challengng task to locate software faults. Debuggng s the man method to locate fault n software, however, t s tmeconsumng [1]. At present program slcng and program spectrum-based methods are currently the man fault locaton technques. Mark Weser recommended program slcng of error varable to exclude uncorrelated statements [2]. Program slcng s a well-known analyss technque that extracts all statements that affect varables of nterest n the program [3][4][5][6]. An executon slce-based technque as reported n [7] can be effectve n locatng the faults. Coverage based fault locaton (CBFL) technques [8][9][10][11][12] (such as Tarantula, SBI) have been used to support software debuggng, these methods use well desgned test cases to get the program coverage nformaton, then the program spectra of passed and faled executons [13] s contrasted to calculate the suspcousness [9] of ndvdual program Correspondng author: Zuohua Dng. enttes. Fnally, software developers check the program enttes accordng to the statements rankng n terms of ther fault suspcousness. However, there are stll some cases such as avalable approaches make unsatsfactory results, because the coverage statstcs of program enttes are calculated separately. Several studes [14][15] have put forward that such calculaton gnores the propagaton of nfected program states among them, whch may cause that located entty s not the really fault. Le Zhao proposed a context-aware fault localzaton approach FP va control flow analyss [14]. Erc Wong proposed a novel approach usng executon slces and nter-block data dependence to effectvely locate the faults to overcome these problems [16]. In order to further mprove the effcency of fault locaton and decrease the rate of code nspecton, we combne control flow edge coverage wth data dependence based slce technque, and calculate the control flow edge suspcousness, then rank the basc blocks n descendng order of ther suspcousness. Although the bug may not be n the suspcous code area, t s lkely to have relatonshps wth those codes that have data dependence wth the suspcous code area. We contnue to use the data dependence to locate the fault. Fnally, we conduct experments to valdate the effectveness of our approach usng benchmarks. The experment results show that our method s more effectve n locatng a program bug by examnng less code before fndng the really faulty statement than the CBFL technque Tarantula n general. The paper s organzed as follows: In Secton II we ntroduce a smple example wth Tarantula technque. Secton III dscusses our method. In Secton IV, we evaluate our method wth experments. Secton V concludes the paper and dscusses the future work. II. AN EXAMPLE In ths secton, we take a smple example to calculate the code nspecton percentage usng the CBFL technque Tarantula. The program s used to calculate the addton and subtracton of two values; t has a fault n the 7th lne, do: /jcp
2 2798 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER 2014 as we can see from the Fg. 1. Accordng to past studes [2][10][17][18][19], frst, we use some desgned test cases to run the program and get the nformaton whether the program wll pass the test or not. We also get the coverage nformaton of the program code lnes, f a statement s covered by a test case, we wll record the statement as 1, conversely record t as 0. If a statement s covered by more faled test cases, the statement s more lkely to contan the fault. Next, we calculate the suspcousness of each statement, the formula s as below: faled() s totalfaled suspcousness() s passed ( s) faled( s) totalpassed totalfaled The passed(s) represents the number of succeed test cases cover the statement s; faled(s) represents the number of faled test cases cover the statements; totalfaled represents the number of faled test cases; totalpassed represents the number of succeed test cases. Then we rank them n descendng order and examne the statement untl the fault s found. Fnally we get the percentage of code nspecton; the result s about 13.3%. Next, we recommend our method though ths example n the next secton. 1 # nclude <stdo.h> 2 double add (nt x, nt y) { 3 double s=0; 4 f(x>0 && y>0) { 5 s=x+y; 6 } 7 return 2*s;// 正确为 return s; 8 } 9 double sub (nt x, nt y) { 10 double s=0; 11 f(x-y>0) { 12 s=x-y; 13 } 14 return s; 15 } 16 double calculate (nt x, nt y, char op) 17 { 18 double s=0; 19 swtch (op) { 20 case '+': s=add(x, y); break; 21 case '-': s=sub(x, y); break; 22 } 23 return s; 24 } 25 nt man (nt argc, char *args []) { 26 FILE *fp; 27 f (args [1] ==NULL) { 28 fp=stdn; 29 } 30 else { 31 fp=fopen (args [1],"r"); 32 } 33 f (fp==null) { 34 fprntf (stout, "error\n"); 35 ext (0); 36 } 37 nt x, y; 38 char op [10]; 39 fscanf (fp,"%d", &x); 40 fscanf (fp,"%d", &y); 41 fscanf (fp,"%s", op); 42 fclose (fp); 43 double s=calculate(x, y, op [0]); 44 fprntf (stdout,"%f\n", s); 45 return 0; 46 } Fgure 1: The source code of program III. METHODLOGY In ths secton, we ntroduce the basc defntons and related technques frstly, and then explan our method. Besdes, we also take the above example descrbed n Fg. 1 to llustrate the procedure of our method and compare the effcency of fault locaton. A. The Fault Locaton Based on Control Flow Edge We frst ntroduce some defntons, A Control Flow Graph (CFG) s an executon graph G = (B, E), B = {b 1, b 2 b m } represents the basc blocks, whch are consecutve statements or expressons contanng no transfer of control except at the end. E = {e 1, e 2 e k } represents the control flow edges that go from one block to the other. Besdes, we defne Path = {p 1, p 2 p n }, e (b, b j ) represents the edge that goes from block b to b j, e(*, b j ) represents all the edges that go to b j and e (b,*) represents all the edges that start from b. B. The Fault Locaton Based on Program Slcng Technque Program slcng technque s used for decomposton of a program [20]. It s one of fault locaton methods orgnally proposed by Mark Weser [21]. A slce contans a set of statements that mght nfluence the value of a varable v at pont s, whch s based on dependence analyss. Data dependence means that a varable s depended on another statement, or vce versa. C. Caculate the Suspcousness of the Basc Block 1) The theory and method We recommend the fault locaton technque based on control flow edge [14] accordng to a smple example.
3 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER Fgure 2: The program and control flow graph Ths basc block s B ={b 1,b 2,b 3,b 4, b 5 }, the control flow edge s E={e(b 1,b 2 ), e(b 2,b 3 ), e(b 2,b 4 ), e(b 3,b 5 ), e(b 4,b 5 )}, the executon path s Path={b 1 b 2 b 3 b 4, b 1 b 2 b 4 b 5 }. The formula of edge suspcousness calculaton s faled( e ) ( e ) (1) passed ( e ) faled( e ) faled (e ) and passed (e ) respectvely represent the number of faled executons and passed executons that cover e. In ths example, prob n (e(s,d)) represents the proporton of θ(e(s,d)) to θ(e(*,d)), that s the start suspcousness of e(s,d). prob out (e(s,d)) represents the proporton of θ(e(s,d)) to θ(e(s,*)), t represents the destnaton suspcousness of e(s,d) prob e(*, d) n( e( s, d)) (2) e(*, d) ( e( s, d)) [ ( e(*, d))] prob es (,*) out ( e( s, d)) (3) es (,*) ( e( s, d)) [ ( es (,*))] In ths example, we suppose that all the executons that cover e (b 3, b 5 ) succeed and those cover e (b 4, b 5 ) faled. Accordng to (1), we can calculate the proneness of b 4 and b 5, whch means the probablty of a block contanng faults. proness b prob e b b 2 ( e( b, b )) 4 5 ( 4) n( ( 4, 5)) 2 ( e( b4, b5 )) ( e( b3, b5 )) proness b prob e b b ( e( b, b )) 4 5 ( 5) out ( ( 4, 5)) 1 ( e( b4, b5)) Accordng to the fal executon path = {b 1,b 2 b n }, b -1 represents the predecessor block of b, b +1 represents the successor block of b. proness( b ) : proness( b ) 1 probn ( e( b 1, b )) prob ( e( b, b )) out 1 Next, n ths way we can get the rato of fault proneness of blocks from b to b n. proness( b ) : proness( b ) :...: proness( b ) 1 2 prob ( b, b ) prob ( b, b ) = 1: :...: prob ( b, b ) prob ( b, b ) n1 out out 1 n1 n n 1 n Ths rato of proneness s correspondng to a faled executon, consderng the entre program, we add all the fault proneness values whch cover the same block, and then the sum of fault proneness represents the block suspcousness, whch s shown n below formula. suspcousness( b) ( proness ( b) faled( path ) 0 & & b path ) In fact, the structure of a program s often very complex when the program contans crculatons, so the constructon of CFG wll be more complex. Le Zhao s paper ddn t menton ths case especally. In our paper, we make the followng treatment. 1) If the basc block occurs frstly n the executon, we calculate ts suspcousness. 2) If the basc block doesn t occur frstly n the executon, we don t make any changes for the suspcousness. 2) The method mplementaton Frst, we need to record the code coverage nformaton; we use the gcov tool whch GNU gcc compler comes wth to acqure the coverage nformaton. Meanwhle we can get the.gcno fle whch records the basc block and arc nformaton, though whch we can construct the control flow graph. Next, we can get the executon path of a test case by the code lnes coverage nformaton combnng wth the code lnes the basc block correspondng to. Fnally we can calculate the suspcousness of the basc block. D. Construct the Program Slce Based on Data Dependence We get the rankng of the suspcousness of basc blocks accordng to the control flow edge coverage nformaton, make use of varable data dependence relaton and then choose the block whch suspcousness s the bggest as the slce defned as D (1). E f and E p respectvely represent the code set that faled test cases and the succeed test cases cover, E all means all code sets. Next, we examne whether D (1) contans fault or not. If t does, we can locate the fault drectly, f t doesn t contan the fault, we expand the code. W.Erc Wong presents an augmentaton method to nclude addtonal code [16], n hs method, the slce D (1) = E f - E p, θ = E f - D (1), whch means the code area to examne addtonally. In our paper, D (1) represents the basc block whch suspcousness s the bggest. Besdes, we defned θ = E all - D (1), consderng more data dependency. We also defne the data dependence relaton f and only f α defnes a varable used n D (1) or α uses a varable j defned n D (1), that s, a and D (1) have the data dependence relaton, whch s defned as a@ D (1). The process s ntroduced as follows: Step1: Defne the slce S (1), whch s the frst code segment examned, S (1) = {a aθ &( a@d (1) )}. Step2: Set = 1. Step3: Examne the S () to see whether t contans the fault. Step4: If true, that s, the fault s located n the slce, then stop. Step5: Set = +1. Step6: Defne the slce S () = S (-1) {a aθ &( a@s (- 1) )},
4 2800 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER 2014 S () s the code segment of the th teraton. Step7: If S () = S ( -1), that s, no new code segment can be ncluded to the slce, then stop. Step8: Go back to Step3. In ths process, we utlze the data dependence to construct the S (), we can see that S (1) S (2) S (3)... By usng the method descrbed n the above part, we calculate the suspcousness of basc block n the Fg. 1. The result s shown n TABLE I. TABLE I THE SUSPICIOUSNESS OF BASIC BLOCK Functon Basc block Code lne Suspcousness man block1 25,27 0 man block man block man block man block man block man block man block man block man block man block man block man block man block14 vrtual block 2.5 calculate block15 16,18,19 0 calculate block calculate block calculate block calculate block19 vrtual block 0.2 sub block20 9,10,11 0 sub block sub block sub block23 vrtual block 0 add block24 2,3,4 80 add block add block add block27 vrtual block 1.33 Next, we select the bggest suspcousness of basc block as the slce D (1) and examne the statements n t, as we can see n the Table II. Although the fault may not be n the suspcous code area, t s lkely to have relatonshps wth those codes that have data dependence wth t. So f the bug s not n D (1), then we need to examne the addtonal code n S (1), S (2), etc. Fnally, we calculate the percentage of code nspecton. TABLE II THE SLICE D (1) Functon Basc block Code lne Code add block25 5 to 5 s=x+y; We don t fnd the bug by examnng the slce D (1), so we expand the code and get the slce S (1) after 1th teraton, as we can see from the Table III. After examnng the slce S (1), we don t fnd the fault stll, so we contnue to expand the code. The result s shown n Table IV. We fnd the fault n the functon add by examnng the slce S (2), we locate the fault successfully after examne 5 lnes code. We can calculate the percentage of code nspecton, whch s about 10.87%. By contrast, we use TABLE III THE SLICE S (1) Functon Basc block Code lne Code add block25 5 to 5 s=x+y; add block24 2 to 4 nt x,nt y double s=0; TABLE IV THE SLICE S (2) Functon Basc block Code lne Code add block25 5 to 5 s=x+y; add block24 2 to 4 nt x,nt y double s=0; Tarantula whch s the tradtonal fault locaton method based on coverage nformaton to get the locaton effect. From the secton II, we can know the percentage of code nspecton s about 13.3% wth Tarantula. By ths smple example, we can see that the effect of our method s better. In order to further valdate our method, we conclude a seral of experments n next secton. TABLE V STATICS OF SUBJECT PROGRAMS Program Faulty Versons Loc Test Cases prnt_tokens prnt_tokens replace schedule schedule tcas tot_nfo IV. THE EXPERIMENTAL EVALUATION In ths secton we conduct the experments to evaluate the effect of our method. A. Expermental Setup In ths study, we use the Semens sute [22] as the subject programs, whch s the most common test sute used to evaluate the effect of fault localzaton technques. An overall descrpton of Semens sute s presented n Table V. Take the prnt_tokens for example, t has seven faulty versons, and each of them has exactly one fault. The lne of codes are 472, the number of test cases are There are 132 faulty versons of the seven subject programs n total. We select Tarantula [17] whch s a typcal CBFL technque to compare wth our method. In our experments, we all select 115 faulty versons to conduct the experments n accordance wth the paper. We only consder the sngle error n ths experment, so we exclude the verson1 of pnt_tokens, versons2 and 7, verson21 of replace, verson3, 10, 11, 15, 31, 32, 33 and 40 of tcas. The errors n verson4 and 6 of prnt_tokens occur only n the header fles, we also exclude them. Verson 10 of prnt_tokens2, verson9 of schedule2 and verson 32 of replace have no test cases fal, so they are not consdered by our experments. We could collect the coverage nformaton. The experment envronment we use s Ubuntu and the
5 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER compler s gcc4.6.1, we use gcov to collect the coverage nformaton. B. Evaluaton Metrc At present, the evaluaton metrc of fault locaton adopted frequently s the score method represented by Jones [17]. In ths paper we also use the score as the evaluaton metrc, whch means the percentage of statements have to be examned untl the fault s found. Frst, we calculate the suspcousness of the basc block and rank them n a descendng order. Code wth a hgher suspcousness should be examned before that wth a lower suspcousness. The score s defned that (s / S) * 100%, s represents the number of statements we should examne untl fndng the fault and S represents the number of executable statements. In our experments, consderng that the codes we need to examne contan executed and partal non-executed statements, S represents the sze of program. C. The Result Analyss We denote our method based on control flow and data dependence by CFDD. In ths experment, we select the CBFL technque such as Tarantula to compare wth our method CFDD. As we can see from the Fg. 3, the x-axs represents the seral numbers of faults, and we select a part of fault numbers whch s 115 n total, whch reflects the overall condton. The partal fault numbers s shown n the followng fgure. The y-axs ndcates the percentage of code that need to be examned to locate a fault,.e the percentage of code nspecton. If the length of the bar s longer, the correspondng fault locaton technque s less effectve. For example, when the seral numbers of faults s 2, the percentage of code nspecton s about 21% wth the Tarantula method whle our method s about 12.4%, whch represents that CFDD s more effectve clearly. By the Fg. 3, we can also fnd that the CFDD does not always perform well for every fault; sometmes the code nspecton s a lttle hgher than Tarantula technque. In order to llustrate the ssue, we calculate the average code nspecton percentage on the seven programs of the Semens sute. It s shown n the Table VI. As we can see from the Table VI, CFDD method performs better than Tarantula on most of the seven programs, whle the effect of CFDD s lower than Tarantula on two versons. By analyzng the experment results, we fnd that when the code nspecton percentage s low wth Tarantula, our method performs slghtly worse than Tarantula. We can also fnd smlar phenomenon mentoned n Le Zhao s paper. If fault locaton s the place where the falures Fgure 3: The comparson of code nspecton percentage among Tarantula and our method TABLE VI THE COMPARISON OF CODE INSPECTION PERCENTAGE BETWEEN TARANTULA AND OUR METHOD ON THE SIEMENS SUITE verson Av era ge Ta ran tul a CF D D prnt _toke ns prnt _toke ns2 rep lac e sched ule sched ule2 occur, and then the Tarantula s sklful n locatng ths type of errors. When the code nspecton percentage wth Tarantula technque s hgh, our method tends to perform better. Because our method s based on the control flow coverage nformaton, t s good at locatng some complex faults that appear n branch condton. Our method s also based on data dependence; t can locate the type of error such as the varable defnton and the mssng code lne. In Fg. 4, we llustrate the cumulatve dstrbuton of effectveness scores per analyss method where the x-axs ndcates the percentage of code that needs to be examned. The y-axs represents the percentage of the fault verson that fault has been located account for all the fault versons. For example, f the value of horzontal axs s 30, the respondng value of y- axs s 71.3, whch means f we examne 30% code, we can fnd the errors of 71.3% fault versons. From the Fg. 4 we can fnd that although our method does not perform well n all types of faults, our method s very promsng n the fault locaton. When the code nspecton percentage s above 15% approxmately, our method can examne more faulty versons than Tarantula technque. We consder the past studes, such as the FP method based on control flow analyss, Le Zhao combnes the FP wth Tarantula, frst uses the Tarantula technque to locate errors, f the error s not found untl the percentage of code nspecton s up to some value, use the FP nstead. The results show that t s more effectve clearly. tca s tot_ nfo
6 2802 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER 2014 Fgure 4: Cumulatve comparson wth Tarantula on the Semens sute V. CONCLUSIONS AND FUTURE WORK In ths paper, we ntroduce the fault locaton technque based on control flow nformaton and data dependency. We use the control flow paths to analyze the program and calculate the block suspcousness, then we use varable data dependence relaton to choose the bggest suspcous block, then ncrease the search doman to locate the really fault. Fnally, we calculate the percentage of code nspecton. Expermental results show that our approach could fnd bugs wth lower code nspecton by programmers. Our method performs better than the Tarantula. In the future, we plan to study what effect dfferent types of faults and dfferent test cases have on our fault locaton method. We are also tryng to ntegratng wth Tarantula further and see f we can get better results. Besdes, the program n Semens sute only contans one error, what f the program contans multple faults; ths problem s worthy to study further. ACKNOWLEDGMENT Ths work s supported by NSFC under Grants No and REFERENCES [1] Jones, James Arthur. Sem-automatc fault localzaton. Dss. Georga Insttute of Technology, [2] Weser, Mark. "Programmers use slces when debuggng." Communcatons of the ACM 25.7 (1982): [3] Agrawal, Hralal, and Joseph R. Horgan. "Dynamc program slcng." ACM SIGPLAN Notces 25.6 (1990): [4] Kusumoto, Shnj, et al. "Expermental evaluaton of program slcng for fault localzaton." Emprcal Software Engneerng 7.1 (2002): [5] Mock, Markus, et al. "Improvng program slcng wth dynamc ponts-to data." Proceedngs of the 10th ACM SIGSOFT symposum on Foundatons of software engneerng. ACM, [6] Mao, Chunyu. "Dynamc Slcng Research of UML Statechart Specfcatons." Journal of Computers 6.4 (2011): [7] Agrawal, Hralal, Rchard A. DeMllo, and Eugene H. Spafford. "Debuggng wth dynamc slcng and backtrackng." Software: Practce and Experence 23.6 (1993): [8] Abreu, Ru, et al. "A practcal evaluaton of spectrumbased fault localzaton." Journal of Systems and Software (2009): [9] Yu, Yanbng, James A. Jones, and Mary Jean Harrold. "An emprcal study of the effects of test-sute reducton on fault localzaton." Proceedngs of the 30th nternatonal conference on Software engneerng. ACM, [10] Jones, James A., and Mary Jean Harrold. "Emprcal evaluaton of the tarantula automatc fault-localzaton technque." Proceedngs of the 20th IEEE/ACM nternatonal Conference on Automated software engneerng. ACM, [11] Chlmb, Trshul M., et al. "HOLMES: Effectve statstcal debuggng va effcent path proflng." Software Engneerng, ICSE IEEE 31st Internatonal Conference on. IEEE, [12] Santelces, Raul, et al. "Lghtweght fault-localzaton usng multple coverage types." Software Engneerng, ICSE IEEE 31st Internatonal Conference on. IEEE, [13] Jeffrey, Denns, Neelam Gupta, and Rajv Gupta. "Fault localzaton usng value replacement." Proceedngs of the 2008 nternatonal symposum on Software testng and analyss. ACM, [14] Zhao, Le, Lna Wang, and Xaodan Yn. "Context-aware fault localzaton va control flow analyss." Journal of Software 6.10 (2011): [15] Zhang, Zhenyu, et al. "Capturng propagaton of nfected program states." Proceedngs of the the 7th jont meetng of the European software engneerng conference and the ACM SIGSOFT symposum on The foundatons of software engneerng. ACM, [16] Wong, W. Erc, and Yu Q. "Effectve program debuggng based on executon slces and nter-block data dependency." Journal of Systems and Software 79.7 (2006): [17] Jones, James A., Mary Jean Harrold, and John Stasko. "Vsualzaton of test nformaton to assst fault localzaton." Proceedngs of the 24th nternatonal conference on Software engneerng. ACM, [18] Lna Chen. Automatc Test Cases Generaton for Statechart Specfcatons from Semantcs to Algorthm. Journal of Computers, 2011,6 (4): [19] Qan, Zhongsheng. "Test Case Generaton and Optmzaton for User Sesson-based Web Applcaton Testng." Journal of Computers 5.11 (2010): [20] Hong, Hyoung Seok, Insup Lee, and Oleg Sokolsky. "Abstract slcng: A new approach to program slcng based on abstract nterpretaton and model checkng." Source Code Analyss and Manpulaton, Ffth IEEE Internatonal Workshop on. IEEE, [21] Weser, Mark. "Program slcng." Proceedngs of the 5th nternatonal conference on Software engneerng. IEEE Press, [22] Hutchns, Monca, et al. "Experments of the effectveness of dataflow-and controlflow-based test adequacy crtera." Proceedngs of the 16th nternatonal conference on Software engneerng. IEEE Computer Socety Press, Chenghu Hu s a graduate student at the Laboratory of Intellgent Computng and Software Engneerng, Zhejang Sc- Tech Unversty, Hangzhou, Chna. Hs research nterests nclude program analyss and program fault locaton.
7 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER Zuohua Dng receved hs Ph.D. degree n mathematcs and M.S. degree n computer scence from the Unversty of South Florda, Tampa, FL, USA, n 1996 and 1998, respectvely. He s currently a Professor and the Drector of the Laboratory of Intellgent Computng and Software Engneerng, Zhejang Sc-Tech Unversty, Hangzhou, Chna, and has been a Research Professor at the Natonal Insttute for Systems Test and Productvty, USA, snce From 1998 to 2001, he was a Senor Software Engneer wth Advanced Fber Communcaton, USA. Hs research nterests nclude system modelng, program analyss, servce computng and Petr nets, subjects on whch he has authored and coauthored more than 70 papers..
A Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationLife Tables (Times) Summary. Sample StatFolio: lifetable times.sgp
Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationAlignment Results of SOBOM for OAEI 2010
Algnment Results of SOBOM for OAEI 2010 Pegang Xu, Yadong Wang, Lang Cheng, Tany Zang School of Computer Scence and Technology Harbn Insttute of Technology, Harbn, Chna pegang.xu@gmal.com, ydwang@ht.edu.cn,
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationUSING GRAPHING SKILLS
Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationA Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures
A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationImproved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment
JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationOptimizing Document Scoring for Query Retrieval
Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationFINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationReliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm
Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationStudy on Properties of Traffic Flow on Bus Transport Networks
Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,
More informationA NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING
A NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING L Jan a, Wan Youchuan a,, Gao Xanjun a a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty,129
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationQuerying by sketch geographical databases. Yu Han 1, a *
4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,
More informationMaximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation
Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn
More informationarxiv: v1 [cs.ro] 21 Jul 2018
Mult-sesson Map Constructon n Outdoor Dynamc Envronment* Xaqng Dng 1, Yue Wang 1, Huan Yn 1, L Tang 1, Rong Xong 1 arxv:1807.08098v1 [cs.ro] 21 Jul 2018 Abstract Map constructon n large scale outdoor envronment
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationA MODEL-BASED BOOK BOUNDARY DETECTION TECHNIQUE FOR BOOKSHELF IMAGE ANALYSIS
A MODEL-BASED BOOK BOUNDARY DETECTION TECHNIQUE FOR BOOKSHELF IMAGE ANALYSIS Ej TAIRA, Sech UCHIDA, Hroak SAKOE Graduate School of Informaton Scence and Electrcal Engneerng, Kyushu Unversty Faculty of
More informationReal-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems
Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationLobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide
Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationBIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING
An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationSequential search. Building Java Programs Chapter 13. Sequential search. Sequential search
Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to
More informationOntology Generator from Relational Database Based on Jena
Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationAlgorithm To Convert A Decimal To A Fraction
Algorthm To Convert A ecmal To A Fracton by John Kennedy Mathematcs epartment Santa Monca College 1900 Pco Blvd. Santa Monca, CA 90405 jrkennedy6@gmal.com Except for ths comment explanng that t s blank
More informationMining Web Logs with PLSA Based Prediction Model to Improve Web Caching Performance
JOURAL OF COMPUTERS, VOL. 8, O. 5, MAY 2013 1351 Mnng Web Logs wth PLSA Based Predcton Model to Improve Web Cachng Performance Chub Huang Department of Automaton, USTC Key laboratory of network communcaton
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationAssembler. Building a Modern Computer From First Principles.
Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought
More informationA Clustering Algorithm for Chinese Adjectives and Nouns 1
Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationA Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1
A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department
More informationA high precision collaborative vision measurement of gear chamfering profile
Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationThe Man-hour Estimation Models & Its Comparison of Interim Products Assembly for Shipbuilding
Internatonal Journal of Operatons Research Internatonal Journal of Operatons Research Vol., No., 9 4 (005) The Man-hour Estmaton Models & Its Comparson of Interm Products Assembly for Shpbuldng Bn Lu and
More informationA Concurrent Non-Recursive Textured Algorithm for Distributed Multi-Utility State Estimation
1 A Concurrent Non-ecursve Textured Algorthm for Dstrbuted Mult-Utlty State Estmaton Garng M. Huang, Senor Member, IEEE, and Jansheng Le, Student Member, IEEE Abstract: Durng power deregulaton, power companes
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationSoftware Trustworthiness Static Measurement Model and the Tool
Avalable onlne at www.jpe-onlne.com vol. 13, no. 7, November 2017, pp. 1101-1110 DOI: 10.23940/jpe.17.07.p13.11011110 Software Trustworthness Statc Measurement Model and the Tool Yan L, Zhqang Wu, Yxang
More informationDesign of Structure Optimization with APDL
Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth
More informationPetri Net Based Software Dependability Engineering
Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationRESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION
RESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION Guo Qngsheng Du Xaochu Wuhan Unversty Wuhan Unversty ABSTRCT: In automatc cartographc generalzaton, the
More informationMining User Similarity Using Spatial-temporal Intersection
www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationSURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB
SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal
More informationA Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*
A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationAccounting for the Use of Different Length Scale Factors in x, y and z Directions
1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,
More informationOptimization of integrated circuits by means of simulated annealing. Jernej Olenšek, Janez Puhan, Árpád Bűrmen, Sašo Tomažič, Tadej Tuma
Optmzaton of ntegrated crcuts by means of smulated annealng Jernej Olenšek, Janez Puhan, Árpád Bűrmen, Sašo Tomažč, Tadej Tuma Unversty of Ljubljana, Faculty of Electrcal Engneerng, Tržaška 25, Ljubljana,
More information