Tracing Lineage Beyond Relational Operators

Size: px
Start display at page:

Download "Tracing Lineage Beyond Relational Operators"

Transcription

1 Tracing Lineage Beyond Relational Operators Mingwu Zhang 1 Xiangyu Zhang 1 Xiang Zhang 2 Sunil Prabhakar 1 1 Computer Science 2 Bindley Bioscience Center Purdue University

2 Introduction Lineage (Data Provenance) is defined as description of the origin of the data and the process by which the data is derived. Lineage is critical for determining data quality and reliability (e.g. biological data, data cleansing) mandated by law (e.g. audit trails for FDA) essential for data dissemination and reproduction Informative (e.g. querying lineage) Database support for tracing lineage is urgent

3 Lineage tracing Input File 1 File 2 Program X Coarse-grained Output File 2 File 4 e.g Workflow level lineage Input File 1 T1,1,2 T2,3,4 Program X Fine-grained Output File 2 R1, 14 R2, 12

4 Tracing fine-grained lineage Input T1,1,2 T2,3,4 Relational Operators State-of-the-art is limited to three Internal special cases Reversible Mathematical Functions Array Manipulation Language (AML) External Output R1,12 R2, 34 Currently no known techniques for general fine-grained lineage tracing??? Cui et al Woodruff & stonebraker A.P.Marathe

5 Contributions Enable fine-grained external lineage tracing for any arbitrary program without requiring Domain expertise Understanding the semantics of the operation Source code Computed lineage is accurate (no false positives) Lineage is derived directly from program execution.

6 Outline Introduction Lineage tracing Case study Conclusion

7 Our approach Automatically trace lineage using only binary executables. Monitor the data flow during program execution. As the program is executed, the lineage of each variable is traced. Each binary instruction is modified to keep track of the data/control dependencies generated by the instruction.

8 Tracing Lineage A statement S data depends on another statement t if and only if a variable is defined at t and then used at S. A statement S control depends on a predicate statement t if and only if the execution of S is the result of the branch outcome of t Definition: Given a program execution, the data lineage of variable v at an execution point of S i, denoted as DL(v@S i ), is the set of input items that are directly or indirectly involved in the computation of the value v at S i

9 Tracing example 1: y=3; 2: a1=3; 3: b1=4; 4: if(y>2) 5: x = a1 + b1; DL( x@5) = ( DL( a1@5) Υ DL( b1@5)) Υ DL(4) = DL( a1@ 2) Υ DL( b1@3) Υ DL( 4) = DL( a1@ 2) Υ DL( b1@3) Υ DL( At Statement 5, x depends upon a1,b1 (data dependency) and y (control dependence) Thus, the lineage of x is the union of the lineages of a1, b1 and y

10 Deriving lineage Let s i : dest =? t j : f( use, use 1,, use n ) be the executed statement instance s i, which assigns a value to variable dest by using variables use, use 1,, use n and s i control depends on t j. Let DEF(x) be the latest statement instance that defines x. U DL(dest@s i ) = ( DL(use i ))U DL(t j ) x = DL(t j )U( U DL(use x )) x.def(use x ) φ U( U {use x })) x.def(use x )=φ

11 Instrumenting the code We use an open-source instrumentation kernel called Valgrind The lineage is typically set data and is stored using a structure called robdd which is optimized for set operations. Shadow memory (SM) stores the lineage sets associated with variables in stack/heap and shadow register file (SRF) stores lineage sets for variables in registers

12 Instrumenting the code Example instrumentation A=(int*) malloc(1) SM(A) = malloc_in_shadow(1) add (x884dc), eax mov SM[x884dc] U SRF(eax), SRF(eax)

13 Architecture We have developed a prototype system based on Valgrind engine to trace finegrained lineage code x86 binary input Valgrind Kernel instrumented code event Instrumenter Runtime bdd bdd robdd output Lineage Repository lineage

14 Outline Introduction Lineage tracing Case study Conclusion

15 Case study: Cancer biomarker discovery Cancer Digestion Isotope Labeling Label1 Normal Digestion Isotope Labeling Label2 1:1 mix LC-MS Doublet Doublet De-Isotope

16 De-isotoping Seq1: ATLNELVEYVSTNR Figure to show challenge of de-isotoping

17 De-isotoping intenisty

18 De-isotoping Seq1: ATLNELVEYVSTNR Seq2: ITCAELR intenisty

19 De-isotope algorithm Complex, mostly heuristics Numerous parameters picked by experts Validity of results can be affected by choice of parameters Identifying a reverse function is impossible, even for experts. Using state-of-the-art algorithm.

20 De-isotope result 25 Pep 1 (H) (ν) Pep 1 (L) (µ) α β γ δ ε Pep 2 (L) (ξ) ζ η θ Pep 2 (H) (ο) ι κ λ

21 Fine-grained lineage Pep 1 (H) (ν) α β γ δ ε ζ η θ ι κ λ Pep 1 (L) (µ) Pep 2 (L) (ξ) Pep 2 (H) (ο)

22 Case study External fine-grained lineage is crucial for our biomarker discovery application Our technique enabled experts to detect errors assess the reliability of data identify false positives identify program limitations

23 Detect error β α γ δ ε ζ η θ ι κ λ µ ν ξ ο π ρ ς σ +4 τ +4 υ +4 φ α β γ δ ε ζ η θ ι ν µ λ κ ξ ο π ρ ς σ +3 τ +3 υ +3 φ

24 Identifying false positives δ 15 α β ε 1 5 γ ζ η θ ι κ λ

25 Program limitations ω ο ι η θ ρ λ α β γ κ δ ε ζ µ ν ξ π ς σ τ υ +2 φ +1 χ +1 ψ ω χ +2 ω υ +1 Ω +1 φ +1 χ +1 ψ υ +2 ψ

26 Performance cluto deisotope apriori rainbow lemur Image processing Auto-class Tracing/ valgrind Tracing (sec) Valgrind (sec) Original (sec) benchmark

27 Memory consumption Benchmark Orig(MB) BDD(MB) Tracing(MB) Auto-class Image processing lemur rainbow apriori deisotope cluto

28 Outline Introduction Tracing lineage Case study Conclusion

29 Conclusion This is the first work that can trace external general fine-grained lineage Advantages Fully automated Does not require user input or domain knowledge Does not need source code The lineage is accurate

30 Conclusion Disadvantage Performance Tracing lineage incurs a slowdown but acceptable for applications in need of lineage Part of the overhead is caused by Valgrind, other industrial instrumentation engines such as dbt (Intel) and valcun (Mirosoft) incur less overhead.

Tracing Lineage Beyond Relational Operators

Tracing Lineage Beyond Relational Operators Purdue University Purdue e-pubs Department of Computer Science Technical Reports Department of Computer Science 2007 Tracing Lineage Beyond Relational Operators Mingwu Zhang Xiangyu Zhang Purdue University,

More information

Quick Start with CASSY Lab. Bi-05-05

Quick Start with CASSY Lab. Bi-05-05 Quick Start with CASSY Lab Bi-05-05 About this manual This manual helps you getting started with the CASSY system. The manual does provide you the information you need to start quickly a simple CASSY experiment

More information

Tabella dei caratteri ASCII e UNICODE

Tabella dei caratteri ASCII e UNICODE Appendice 1: ausiliaria Tabella dei caratteri ASCII e UNICODE formato di stampa: A4 APP_1A_IT_R3.0.docx 1 di 9 Indice 1 TABELLE DEI CARATTERI... 3 Caratteri ASCII... 3 Lettere greche... -4 APP_1A_IT_R3.0.docx

More information

For personal use only

For personal use only ACN: 062 284 084 ASX Code: SYS!! #! % &!! ( )!!!!&%!&!! + % % &! &! %,!% &%!!% &% &!%!! &!!% && &,!%! %, &%! & &&!%!! &!% &!! ( &!% &!!!!!!%. / 0 10 1 % 2! & &!,,, & ( & ! 3! (4&!! (!!% & &! &5 )!!!!4

More information

Kristoffer H. Rose. Version /01/07

Kristoffer H. Rose. Version /01/07 Summary of qsymbols Kristoffer H. Rose Version 1.12 1997/01/07 Abstract qsymbols is a L A TEX [1] package defining systematic mnemonic abbreviations, starting with a single open quote for symbols, and

More information

Myriad Pro Light. Lining proportional. Latin capitals. Alphabetic. Oldstyle tabular. Oldstyle proportional. Superscript ⁰ ¹ ² ³ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹,.

Myriad Pro Light. Lining proportional. Latin capitals. Alphabetic. Oldstyle tabular. Oldstyle proportional. Superscript ⁰ ¹ ² ³ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹,. Myriad Pro Light Latin capitals A B C D E F G H I J K L M N O P Q R S T U V W X Y Z & Æ Ł Ø Œ Þ Ð Á Â Ä À Å Ã Ç É Ê Ë È Í Î Ï Ì İ Ñ Ó Ô Ö Ò Õ Š Ú Û Ü Ù Ý Ÿ Ž Ă Ā Ą Ć Č Ď Đ Ě Ė Ē Ę Ğ Ģ Ī Į Ķ Ĺ Ľ Ļ Ń Ň Ņ

More information

file:///export/home/apostolo/work/tex/mkindex/mkgrki...

file:///export/home/apostolo/work/tex/mkindex/mkgrki... The correct generation and typesetting of an index for a Greek document prepared with LaTeX is not a trivial task at all. First of all, the program makeindex cannot handle Greek letters, but even if the.idx

More information

Palatino. Palatino. Linotype. Palatino. Linotype. Linotype. Palatino. Linotype. Palatino. Linotype. Palatino. Linotype

Palatino. Palatino. Linotype. Palatino. Linotype. Linotype. Palatino. Linotype. Palatino. Linotype. Palatino. Linotype Copyright 2013 Johanna Corsini Arts 79 Typography 1 Sources: http://en.wikipedia.org/wiki/ http://en.wikipedia.org/wiki/typography By Johanna Corsini P a a P o l t a a n L P i l t n a i o a o y l t n n

More information

2. Unlock the Customization Features: The Edit Button Click the "Edit" button on the Dashboard Home Page to unlock the customization features.

2. Unlock the Customization Features: The Edit Button Click the Edit button on the Dashboard Home Page to unlock the customization features. 1. Introduction: Customize Content for Your Students The Garland Science Learning System (GSLS) is completely customizable. You can edit, delete, or add content to create a unique learning experience for

More information

3D-reconstruction and evaluation of MR images of children with juvenile idiopathic arthritis (JIA)

3D-reconstruction and evaluation of MR images of children with juvenile idiopathic arthritis (JIA) Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2012 3D-reconstruction and evaluation of MR images of children with juvenile

More information

COLORPOP! User Guide

COLORPOP! User Guide COLORPOP! User Guide Copyright 2018 Newell Rubbermaid Europe, LLC. All rights reserved. Rev. 6/18 No part of this document may be reproduced or transmitted in any form or by any means or translated into

More information

KbdKaz 500 layout tables

KbdKaz 500 layout tables a ao a ao a o o o o o a a oo A o a a o a a oa ao oo A o a a o oa ao A a o a oa oa ao o a a a a o a A a a A ˆ a a A ˇ ao a a A a a A o Ao a a A Ao a o a a A ao a o a a A α a A a a a A o o a a A A a a A

More information

News from the Wrapper

News from the Wrapper News from the Wrapper Gesellschaft für Schwerionenforschung mbh Darmstadt, Germany JACoW Team Meeting 2004 Knoxville, Tennessee November 7, 2004 What is still the same? What is still the same? What has

More information

BMC Evolutionary Biology 2008, 8:89

BMC Evolutionary Biology 2008, 8:89 BMC Evolutionary Biology This Provisional PDF corresponds to the article as it appeared upon acceptance. Fully formatted PDF and full text (HTML) versions will be made available soon. Selection against

More information

The package paresse. Le TEXnicien de surface February 16, 2013

The package paresse. Le TEXnicien de surface February 16, 2013 The package paresse Le TXnicien de surface le.texnicien.de.surface@wanadoo.fr February 16, 2013 Abstract This package implements an example from T. Lachand-Robert in [1]. It provides a means of typing

More information

r v i e w o f s o m e r e c e n t d e v e l o p m

r v i e w o f s o m e r e c e n t d e v e l o p m O A D O 4 7 8 O - O O A D OA 4 7 8 / D O O 3 A 4 7 8 / S P O 3 A A S P - * A S P - S - P - A S P - - - - L S UM 5 8 - - 4 3 8 -F 69 - V - F U 98F L 69V S U L S UM58 P L- SA L 43 ˆ UéL;S;UéL;SAL; - - -

More information

The LibertinusT1 Math Package

The LibertinusT1 Math Package The LibertinusT1 Math Package Michael Sharpe September 20, 2018 This package is a LATEX math package to accompany the LATEX Libertine text package, serving as an alternative to newtxmath with the libertine

More information

University Senate 6 May :30 PM Wang Lecture Hall 2

University Senate 6 May :30 PM Wang Lecture Hall 2 University Senate 6 May 2013 3:30 PM Wang Lecture Hall 2 I. Approval of the Agenda II. Approval of the Minutes from April III. Report from the President of the Senate IV. Report on D1 Athletics (J. Fiore)

More information

Character Entity References in HTML 4 and XHTML 1.0

Character Entity References in HTML 4 and XHTML 1.0 1 of 12 2/2/2009 2:55 PM Character References in HTML 4 and XHTML 1.0 Here is a set of tables containing the 252 allowed entities in HTML 4 and XHTML 1.0, as described in section 24 of the official HTML

More information

SharePoint Wiki Plus Getting Started

SharePoint Wiki Plus Getting Started SharePoint Wiki Plus Getting Started Installation & User Guide Copyright 2005-2008 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 148 Castle Rock Dr. Richmond Hill, Ontario L4C

More information

University of St Andrews Cardiff Business School!!! # % # &! (!#! ) +!!!,#!,! %,!! # 6!! 7.! % %788! 7 9 8! 8! (:0; <= (

University of St Andrews Cardiff Business School!!! # % # &! (!#! ) +!!!,#!,! %,!! # 6!! 7.! % %788! 7 9 8! 8! (:0; <= ( Reid, Gavin C. and Smith, Julia A. (2005) Venture capital investor behaviour in the backing of UK high technology firms : financial reporting and the level of investment. Discussion paper. Centre for Research

More information

ALLEGRIA USER MANUAL. François Schiettekatte, Martin Chicoine Université de Montréal May 13, 2004

ALLEGRIA USER MANUAL. François Schiettekatte, Martin Chicoine Université de Montréal May 13, 2004 ALLEGRIA USER MANUAL François Schiettekatte, Martin Chicoine Université de Montréal May 13, 2004 1 Contents Introduction 3 I SpectrumExtractor 4 1 Data files format 4 2 Obtaining energy spectra with SpectrumExtractor

More information

Hur gör man för att skriva klassisk grekiska?

Hur gör man för att skriva klassisk grekiska? Hur gör man för att skriva klassisk grekiska? I operativsystemet Win10 byter man språk med en enkel knapptryckning i aktivitetsfeltet: SWE > ΕΛ Man kan ladda ner ett lämpligt typsnitt, SBL Bib Lit, på

More information

mdput for mathematical typesetting with Adobe Utopia Paul Pichaureau January 29, 2006

mdput for mathematical typesetting with Adobe Utopia Paul Pichaureau January 29, 2006 mdput for mathematical typesetting with Adobe Utopia Paul Pichaureau January 29, 2006 Contents 1 Introduction 1 1.1 Requirements.................................................... 1 1.2 The name of the

More information

FREE. 3-in-1 Printer... Labeling, Bar Code, and Heat Shrink Tube Identification

FREE. 3-in-1 Printer... Labeling, Bar Code, and Heat Shrink Tube Identification 3-in-1 Printer... Labeling, Bar Code, and Heat Shrink Tube Identificati 3 Year FREE Printer Warranty Industrial printer works like a Bee solving your labeling needs in the factory, warehouse, laboratory,

More information

Always there to help you. Register your product and get support at M110. Question? Contact Philips.

Always there to help you. Register your product and get support at  M110. Question? Contact Philips. Always there to help you Register your product and get support at www.philips.com/support Question? Contact Philips M110 User manual Contents 1 Important safety instructions 2 2 Your phone 3 What is in

More information

! " # $ % & ' ( ) * +, -. / : ; < =

!  # $ % & ' ( ) * +, -. / : ; < = ! " # $ % & ' ( ) 32 33 34 35 36 37 38 39 40 41 * +, -. / 0 1 2 3 42 43 44 45 46 47 48 49 50 51 4 5 6 7 8 9 : ; < = 52 53 54 55 56 57 58 59 60 61 >? @ A B C D E F G 62 63 64 65 66 67 68 69 70 71 H I J

More information

Ternary Butterfly Subdivision

Ternary Butterfly Subdivision Ternary Butterfly Subdivision Ruotian Ling a,b Xiaonan Luo b Zhongxian Chen b,c a Department of Computer Science, The University of Hong Kong b Computer Application Institute, Sun Yat-sen University c

More information

4th of July

4th of July IDNs in Greece Segredakis Vaggelis Administrator Registry of [.gr] Domain Names Institute of Computer Science Foundation for Research and Technology Hellas Email: segred@ics.forth.gr IDN Facts The registration

More information

Topic Training Engineering Report

Topic Training Engineering Report Topic Training Engineering Report Topic Training Engineering Report All information in this document is subject to modification without prior notice. No part of this manual may be reproduced, stored in

More information

Documentation for the betababel.sty package

Documentation for the betababel.sty package Documentation for the betababel.sty package Felix G. Berkemeier 2005/07/10 Abstract The betababel package extends the polutonikogreek option of the babel package. It provides the possibility to directly

More information

Windows Memory Forensics and Direct Kernel Object Manipulation. Jesse Kornblum

Windows Memory Forensics and Direct Kernel Object Manipulation. Jesse Kornblum Windows Memory Forensics and Direct Kernel Object Manipulation Jesse Kornblum Outline Introduction The Kernel Direct Kernel Object Manipulation Standard DKOM Devious DKOM Better Magic Relations Between

More information

Nutthapat Kaewrattanapat. Lecture in Principle of Web Design

Nutthapat Kaewrattanapat. Lecture in Principle of Web Design ASCII CODE (ASCII CHARACTERS) ls should display in files using charsets ISO 8859-1 or UTF-8. [ " ] quotation mark [name: "] [number: "] [ & ] ampersand [name: &] [number: &] [ < ] less than [name:

More information

Cost Effective Forward Tracing Data Lineage

Cost Effective Forward Tracing Data Lineage Purdue University Purdue e-pubs Department of Computer Science Technical Reports Department of Computer Science 2007 Cost Effective Forward Tracing Data Lineage Mingwu Zhang Xiangyu Zhang Purdue University,

More information

SharePoint Wiki Plus User Guide

SharePoint Wiki Plus User Guide SharePoint Wiki Plus User Guide Installation & User Guide Copyright 2005-2008 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 148 Castle Rock Dr. Richmond Hill, Ontario L4C 5K5,

More information

Project Fortress: A Multicore Language for Scientists and Engineers

Project Fortress: A Multicore Language for Scientists and Engineers Project Fortress: A Multicore Language for Scientists and Engineers Sukyoung Ryu Department of Computer Science Korea Advanced Institute of Science and Technology December 13, 2009 Copyright c 2009 Sun

More information

Introduction to Computer Science

Introduction to Computer Science Introduction to Computer Science Jürgen Schönwälder Jacobs University Bremen December 22, 2017 http://cnds.eecs.jacobs-university.de/courses/ics-2017 Jürgen Schönwälder (Jacobs University Bremen) Introduction

More information

Data Diffusion: Dynamic Resource Provision and Data-Aware Scheduling for Data-Intensive Applications

Data Diffusion: Dynamic Resource Provision and Data-Aware Scheduling for Data-Intensive Applications Data Diffusion: Dynamic Resource Provision and Data-Aware Scheduling for Data-Intensive Applications Ioan Raicu, Yong Zhao 2, Ian Foster,3,4, Alex Szalay 5 iraicu@cs.uchicago.edu, yozha@microsoft.com,

More information

Introduction to Computer Science

Introduction to Computer Science Introduction to Computer Science Jürgen Schönwälder Jacobs University Bremen December 7, 2018 https://cnds.jacobs-university.de/courses/ics-2018 Jürgen Schönwälder (Jacobs University Bremen) Introduction

More information

SharePoint Wiki Plus User Guide

SharePoint Wiki Plus User Guide SharePoint Wiki Plus User Guide Installation & User Guide Copyright 2005-2012 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 50 McIntosh Drive, Unit 109 Markham, Ontario ON L3R

More information

1. Benchmarks. 1.1 TailBench: A Benchmark Suite and Evaluation Methodology for Latency-Critical Applications [IISWC 2016]

1. Benchmarks. 1.1 TailBench: A Benchmark Suite and Evaluation Methodology for Latency-Critical Applications [IISWC 2016] ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ ΣΧΟΛΗ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΜΗΧΑΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΤΟΜΕΑΣ ΤΕΧΝΟΛΟΓΙΑΣ ΠΛΗΡΟΦΟΡΙΚΗΣ ΚΑΙ ΥΠΟΛΟΓΙΣΤΩΝ Ε Ρ Γ Α Σ Τ Η Ρ Ι Ο Υ Π Ο Λ Ο Γ Ι Σ Τ Ι Κ Ω Ν Σ Υ Σ Τ Η Μ Α Τ Ω Ν www.

More information

Typed Lambda Calculus

Typed Lambda Calculus Department of Linguistics Ohio State University Sept. 8, 2016 The Two Sides of A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a system of notation for functions

More information

SharePoint Wiki Plus User Guide

SharePoint Wiki Plus User Guide SharePoint Wiki Plus User Guide Installation & User Guide Copyright 2005-2009 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 50 McIntosh Drive, Unit 109 Markham, Ontario ON L3R

More information

Distributed and Centralized Hybrid CSMA/CA-TDMA Schemes for Single-Hop Wireless Networks

Distributed and Centralized Hybrid CSMA/CA-TDMA Schemes for Single-Hop Wireless Networks Distributed and Centralized Hybrid CSMA/CA-TDMA Schemes for Single-Hop Wireless Networks Bharat Shrestha, Ekram Hossain, and Kae Won Choi arxiv:40.5528v [cs.ni] 22 Jan 204 Abstract The strength of carrier-sense

More information

Copyright c 2008 Sun Microsystems, Inc. ( Sun ). All rights are reserved by Sun except as expressly stated as follows. Permission to make digital or

Copyright c 2008 Sun Microsystems, Inc. ( Sun ). All rights are reserved by Sun except as expressly stated as follows. Permission to make digital or Copyright c 2008 Sun Microsystems, Inc. ( Sun ). All rights are reserved by Sun except as expressly stated as follows. Permission to make digital or hard copies of all or part of this work for personal

More information

Quick Start Instructions on using MyOMLab with the JAWS Screen Reader*

Quick Start Instructions on using MyOMLab with the JAWS Screen Reader* Quick Start Instructions on using MyOMLab with the JAWS Screen Reader* To work on assignments in MyOMLab with JAWS, follow these steps to turn on the Automatically Detect for Accessibility Setting: 1.

More information

Estimating Quantiles from the Union of Historical and Streaming Data

Estimating Quantiles from the Union of Historical and Streaming Data Estimating Quantiles from the Union of Historical and Streaming Data Sneha Aman Singh, Iowa State University Divesh Srivastava, AT&T Labs - Research Srikanta Tirthapura, Iowa State University Quantiles

More information

Towards Automated Collection of Application-Level Data Provenance

Towards Automated Collection of Application-Level Data Provenance Towards Automated Collection of Application-Level Data Provenance Dawood Tariq Maisem Ali Ashish Gehani SRI International Abstract Gathering data provenance at the operating system level is useful for

More information

General theory of rectilinear ray systems

General theory of rectilinear ray systems Allgemeine Theorie der gradlinigen Strahlensysteme J. f. reine u. angew. Math. 57 (860) 89-30. General theory of rectilinear ray systems (By E. E. Kummer in Berlin) Translated by D. H. Delphenich Up to

More information

A Family of Recompositions of the Penrose Aperiodic Protoset and its Dynamic Properties

A Family of Recompositions of the Penrose Aperiodic Protoset and its Dynamic Properties Rose-Hulman Undergraduate Mathematics Journal Volume 12 Issue 2 Article 7 A Family of Recompositions of the Penrose Aperiodic Protoset and its Dynamic Properties Vivian Olsiewski Healey University of Notre

More information

Introduction to Computer Science

Introduction to Computer Science Introduction to Computer Science Jürgen Schönwälder December 22, 2017 Abstract This memo contains annotated slides for the course Introduction to Computer Science. The material is inspired by the course

More information

Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach

Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu Department of Computer Sciences Purdue University {zlin, xyzhang, dxu}@cs.purdue.edu

More information

An Efficient Transformation for Klee s Measure Problem in the Streaming Model Abstract Given a stream of rectangles over a discrete space, we consider the problem of computing the total number of distinct

More information

Locating Faults Through Automated Predicate Switching

Locating Faults Through Automated Predicate Switching Locating Faults Through Automated Predicate Switching Authored by Xiangyu Zhang, Neelam Gupta, Rajiv Gupta The University of Arizona ICSE 2006 Presented by Jing Pu Authors 1 Neelam Gupta The University

More information

Graphical Models & HMMs

Graphical Models & HMMs Graphical Models & HMMs Henrik I. Christensen Robotics & Intelligent Machines @ GT Georgia Institute of Technology, Atlanta, GA 30332-0280 hic@cc.gatech.edu Henrik I. Christensen (RIM@GT) Graphical Models

More information

Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes

Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Marta Pujol and Mercè Villanueva Combinatorics, Coding and Security Group (CCSG) Universitat Autònoma de Barcelona (UAB) VIII JMDA, Almería

More information

Probabilistic systems a place where categories meet probability

Probabilistic systems a place where categories meet probability Probabilistic systems a place where categories meet probability Ana Sokolova SOS group, Radboud University Nijmegen University Dortmund, CS Kolloquium, 12.6.6 p.1/32 Outline Introduction - probabilistic

More information

An Efficient Clustering Scheme using Support Vector Methods

An Efficient Clustering Scheme using Support Vector Methods An Efficient Clustering Scheme using Support Vector Methods J Saketha Nath 1 and S K Shevade 2 1 Supercomputer Education and Research Center, Indian Institute of Science, Bangalore-5612, INDIA. Saketh.Nath@gmail.com

More information

Typed Lambda Calculus for Syntacticians

Typed Lambda Calculus for Syntacticians Department of Linguistics Ohio State University January 12, 2012 The Two Sides of Typed Lambda Calculus A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a

More information

The XCharter Font Package

The XCharter Font Package The XCharter Font Package Michael Sharpe December 14, 2017 1 Package Features The XCharter fonts are extensions of the Bitstream Charter fonts, adding oldstyle figures (proportionally spaced only), superior

More information

Query Access Assurance in Outsourced Databases

Query Access Assurance in Outsourced Databases IEEE TRANSACTIONS ON SERVICES COMPUTING Query Access Assurance in Outsourced Databases Wangchao Le, Feifei Li Member, IEEE Abstract Query execution assurance is an important concept in defeating lazy servers

More information

Exact Models for Open Field Layout Problem with l 2 and l 1 Distances

Exact Models for Open Field Layout Problem with l 2 and l 1 Distances R u t c o r Research R e p o r t Exact Models for Open Field Layout Problem with l 2 and l 1 Distances Gergely Kovács a Béla Vizvári b RRR 1-2014, May 2014, RUTCOR Rutgers Center for Operations Research

More information

Performance models for master/slave parallel programs

Performance models for master/slave parallel programs Performance models for master/slave parallel programs PASM 2004 Lucas Baldo Leonardo Brenner Luiz G. Fernandes Paulo Fernandes Afonso Sales {lbaldo, lbrenner, gustavo, paulof, asales}@inf.pucrs.br. PUCRS

More information

Extended user documentation

Extended user documentation Always there to help you Register your product and get support at www.philips.com/support Question? Contact Philips M345 Extended user documentation Contents 1 Important safety instructions 3 2 Your phone

More information

Extended user documentation

Extended user documentation Always there to help you Register your product and get support at www.philips.com/support Question? Contact Philips M330 M335 Extended user documentation Contents 1 Important safety instructions 3 2 Your

More information

Extended user documentation

Extended user documentation Always there to help you Register your product and get support at www.philips.com/welcome Question? Contact Philips D210 D215 Extended user documentation Contents 1 Important safety instructions 3 2 Your

More information

10 years of OpenType math font development

10 years of OpenType math font development Overview Choices of math fonts Completeness Design consistency Testing Summary 10 years of OpenType math font development Ulrik Vieth Stuttgart, Germany TUG@BachoT E X 2017 Brodnica, Poland Overview Choices

More information

A Comparison of Lauritzen-Spiegelhalter, Hugin, and Shenoy-Shafer Architectures for Computing Marginals of Probability Distributions

A Comparison of Lauritzen-Spiegelhalter, Hugin, and Shenoy-Shafer Architectures for Computing Marginals of Probability Distributions Appeared in: G. F. Cooper & S. Moral (eds.), Uncertainty in Artificial Intelligence, Vol. 14, 1999, pp. 328--337, Morgan Kaufmann, San Francisco, CA. A Comparison of Lauritzen-Spiegelhalter, Hugin, and

More information

Edge and local feature detection - 2. Importance of edge detection in computer vision

Edge and local feature detection - 2. Importance of edge detection in computer vision Edge and local feature detection Gradient based edge detection Edge detection by function fitting Second derivative edge detectors Edge linking and the construction of the chain graph Edge and local feature

More information

Sémantique des Langages de Programmation (SemLP) DM : Region Types

Sémantique des Langages de Programmation (SemLP) DM : Region Types Sémantique des Langages de Programmation (SemLP) DM : Region Types I) Submission Submission Date : 21/05/2017 Submission Format : Submit a virtual machine (.ova) 1 with 1. an executable of the interpreter,

More information

HP Certified Professional

HP Certified Professional HP Certified Professional HP ProLiant Server Maintenance HP2-061 Exam Datasheet Audience This exam is for warranty and service delivery personnel with at least 6 months experience. These individuals perform

More information

Regularized Robust Coding for Face Recognition

Regularized Robust Coding for Face Recognition Regularized Robust Coding for Face Recognition Meng Yang a, Student Member, IEEE, Lei Zhang a,, Member, IEEE Jian Yang b, Member, IEEE, and David Zhang a, Fellow, IEEE a Dept. of Computing, The Hong Kong

More information

TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption

TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption future internet Article TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption Jinsheng Zhang 1, Qiumao Ma 1, Wensheng Zhang 1, * and Daji Qiao 2 1 Department of Computer Science,

More information

Performance Evaluation of an Interior Point Filter Line Search Method for Constrained Optimization

Performance Evaluation of an Interior Point Filter Line Search Method for Constrained Optimization 6th WSEAS International Conference on SYSTEM SCIENCE and SIMULATION in ENGINEERING, Venice, Italy, November 21-23, 2007 18 Performance Evaluation of an Interior Point Filter Line Search Method for Constrained

More information

Human Action Attribute Learning From Video Data Using Low-Rank Representations

Human Action Attribute Learning From Video Data Using Low-Rank Representations 1 Human Action Attribute Learning From Video Data Using Low-Rank Representations Tong Wu, Student Member, IEEE, Prudhvi Gurram, Senior Member, IEEE, Raghuveer M. Rao, Fellow, IEEE, and Waheed U. Bajwa,

More information

THE COCHINEAL FONT PACKAGE

THE COCHINEAL FONT PACKAGE THE COCHINEAL FONT PACKAGE MICHAEL SHARPE Cochineal is a fork of Crimson, a remarkable creation of Sebastian Kosch inspired by oldstyle font designers. The name Cochineal is intended to suggest that, while

More information

Comparison of Interior Point Filter Line Search Strategies for Constrained Optimization by Performance Profiles

Comparison of Interior Point Filter Line Search Strategies for Constrained Optimization by Performance Profiles INTERNATIONAL JOURNAL OF MATHEMATICS MODELS AND METHODS IN APPLIED SCIENCES Comparison of Interior Point Filter Line Search Strategies for Constrained Optimization by Performance Profiles M. Fernanda P.

More information

Always there to help you. Register your product and get support at CD280 CD285. Question? Contact Philips.

Always there to help you. Register your product and get support at   CD280 CD285. Question? Contact Philips. Always there to help you Register your product and get support at www.philips.com/welcome Question? Contact Philips CD280 CD285 User manual Contents 1 Important safety instructions 5 2 Your CD280/CD285

More information

Experimental Evaluation of Using Dynamic Slices for Fault Location

Experimental Evaluation of Using Dynamic Slices for Fault Location Experimental Evaluation of Using Dynamic Slices for Fault Location Xiangyu Zhang Haifeng He Neelam Gupta Rajiv Gupta Department of Computer Science The University of Arizona Tucson, Arizona 85721 {xyzhang,hehf,ngupta,gupta}@cs.arizona.edu

More information

Cost-efficient QoS-Aware Data Acquisition Point Placement for Advanced Metering Infrastructure

Cost-efficient QoS-Aware Data Acquisition Point Placement for Advanced Metering Infrastructure Cost-efficient QoS-Aware Data Acquisition Point Placement for Advanced Metering Infrastructure Fariba Aalamifar and Lutz Lampe Department of Electrical and Computer Engineering, The University of British

More information

WATERMARKING, without any exception, has been

WATERMARKING, without any exception, has been 1 A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-all Usability Constraints M. Kamran, Sabah Suhail, and Muddassar Farooq Abstract Ownership protection on

More information

used to describe all aspects of imaging process: input scene f, imaging system O, and output image g.

used to describe all aspects of imaging process: input scene f, imaging system O, and output image g. SIMG-716 Linear Imaging Mathematics I 03 1 Representations of Functions 1.1 Functions Function: rule that assigns one numerical value (dependent variable) to each of a set of other numerical values (independent

More information

The Extended Algebra. Duplicate Elimination. Sorting. Example: Duplicate Elimination

The Extended Algebra. Duplicate Elimination. Sorting. Example: Duplicate Elimination The Extended Algebra Duplicate Elimination 2 δ = eliminate duplicates from bags. τ = sort tuples. γ = grouping and aggregation. Outerjoin : avoids dangling tuples = tuples that do not join with anything.

More information

arxiv: v2 [cs.ds] 30 Sep 2016

arxiv: v2 [cs.ds] 30 Sep 2016 Synergistic Sorting, MultiSelection and Deferred Data Structures on MultiSets Jérémy Barbay 1, Carlos Ochoa 1, and Srinivasa Rao Satti 2 1 Departamento de Ciencias de la Computación, Universidad de Chile,

More information

Monitoring Interfaces for Faults

Monitoring Interfaces for Faults Monitoring Interfaces for Faults Aleksandr Zaks RV 05 - Fifth Workshop on Runtime Verification Joint work with: Amir Pnueli, Lenore Zuck Motivation Motivation Consider two components interacting with each

More information

Scalable and Precise Dynamic Datarace Detection for Structured Parallelism

Scalable and Precise Dynamic Datarace Detection for Structured Parallelism Scalable and Precise Dynamic Datarace Detection for Structured Parallelism Raghavan Raman Rice University raghav@rice.edu Jisheng Zhao Rice University jisheng.zhao@rice.edu Vivek Sarkar Rice University

More information

Giovanni De Micheli. Integrated Systems Centre EPF Lausanne

Giovanni De Micheli. Integrated Systems Centre EPF Lausanne Two-level Logic Synthesis and Optimization Giovanni De Micheli Integrated Systems Centre EPF Lausanne This presentation can be used for non-commercial purposes as long as this note and the copyright footers

More information

Drawing Outer 1-planar Graphs with Few Slopes

Drawing Outer 1-planar Graphs with Few Slopes Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 19, no. 2, pp. 707 741 (2015) DOI: 10.7155/jgaa.00376 Drawing Outer 1-planar Graphs with Few Slopes Emilio Di Giacomo Giuseppe Liotta

More information

Walking Location Algorithms

Walking Location Algorithms University of West Bohemia in Pilsen Department of Computer Science and Engineering Univerzitní 8 30614 Pilsen Czech Republic Walking Location Algorithms State of the Art and Concept of PhD. Thesis Roman

More information

Efficient, Scalable, and Provenance-Aware Management of Linked Data

Efficient, Scalable, and Provenance-Aware Management of Linked Data Efficient, Scalable, and Provenance-Aware Management of Linked Data Marcin Wylot 1 Motivation and objectives of the research The proliferation of heterogeneous Linked Data on the Web requires data management

More information

Lab 07: Maximum Likelihood Model Selection and RAxML Using CIPRES

Lab 07: Maximum Likelihood Model Selection and RAxML Using CIPRES Integrative Biology 200, Spring 2014 Principles of Phylogenetics: Systematics University of California, Berkeley Updated by Traci L. Grzymala Lab 07: Maximum Likelihood Model Selection and RAxML Using

More information

Model-Driven Matching and Segmentation of Trajectories

Model-Driven Matching and Segmentation of Trajectories Model-Driven Matching and Segmentation of Trajectories Jiangwei Pan (Duke University) joint work with Swaminathan Sankararaman (Akamai Technologies) Pankaj K. Agarwal (Duke University) Thomas Mølhave (Scalable

More information

A Semi-group of Hashing Functions & Hash Tables

A Semi-group of Hashing Functions & Hash Tables A Semi-group of Hashing Functions & Hash Tables Arthur Hughes University of Dublin, Trinity College, Dublin, Ireland e-mail: Arthur.P.Hughes@cs.tcd.ie January 19, 1997 Abstract A model of a hash table

More information

Computing Aggregate Functions in Sensor Networks

Computing Aggregate Functions in Sensor Networks Computing Aggregate Functions in Sensor Networks Antonio Fernández Anta 1 Miguel A. Mosteiro 1,2 Christopher Thraves 3 1 LADyR, GSyC,Universidad Rey Juan Carlos 2 Dept. of Computer Science, Rutgers University

More information

Scalable Bayes Clustering for Outlier Detection Under Informative Sampling

Scalable Bayes Clustering for Outlier Detection Under Informative Sampling Scalable Bayes Clustering for Outlier Detection Under Informative Sampling Based on JMLR paper of T. D. Savitsky Terrance D. Savitsky Office of Survey Methods Research FCSM - 2018 March 7-9, 2018 1 / 21

More information

Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach

Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach Zhiqiang Lin Xiangyu Zhang Dongyan Xu Department of Computer Sciences and CERIAS Purdue University {zlin, xyzhang,

More information

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE COMP 62421 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Querying Data on the Web Date: Wednesday 24th January 2018 Time: 14:00-16:00 Please answer all FIVE Questions provided. They amount

More information

MULTI-RESOLUTION STATISTICAL ANALYSIS ON GRAPH STRUCTURED DATA IN NEUROIMAGING

MULTI-RESOLUTION STATISTICAL ANALYSIS ON GRAPH STRUCTURED DATA IN NEUROIMAGING MULTI-RESOLUTION STATISTICAL ANALYSIS ON GRAPH STRUCTURED DATA IN NEUROIMAGING, Vikas Singh, Moo Chung, Nagesh Adluru, Barbara B. Bendlin, Sterling C. Johnson University of Wisconsin Madison Apr. 19, 2015

More information

CSE-321 Programming Languages 2010 Final

CSE-321 Programming Languages 2010 Final Name: Hemos ID: CSE-321 Programming Languages 2010 Final Prob 1 Prob 2 Prob 3 Prob 4 Prob 5 Prob 6 Total Score Max 18 28 16 12 36 40 150 There are six problems on 16 pages, including two work sheets, in

More information

A parallel iterative approach for the Stokes Darcy coupling

A parallel iterative approach for the Stokes Darcy coupling A parallel iterative approach for the Stokes Darcy coupling Marco Discacciati*, Alfio Quarteroni**, Alberto Valli*** * Institute of Analysis and Scientific Computing, EPFL ** Institute of Analysis and

More information