Tracing Lineage Beyond Relational Operators
|
|
- Edward Nathaniel Byrd
- 6 years ago
- Views:
Transcription
1 Tracing Lineage Beyond Relational Operators Mingwu Zhang 1 Xiangyu Zhang 1 Xiang Zhang 2 Sunil Prabhakar 1 1 Computer Science 2 Bindley Bioscience Center Purdue University
2 Introduction Lineage (Data Provenance) is defined as description of the origin of the data and the process by which the data is derived. Lineage is critical for determining data quality and reliability (e.g. biological data, data cleansing) mandated by law (e.g. audit trails for FDA) essential for data dissemination and reproduction Informative (e.g. querying lineage) Database support for tracing lineage is urgent
3 Lineage tracing Input File 1 File 2 Program X Coarse-grained Output File 2 File 4 e.g Workflow level lineage Input File 1 T1,1,2 T2,3,4 Program X Fine-grained Output File 2 R1, 14 R2, 12
4 Tracing fine-grained lineage Input T1,1,2 T2,3,4 Relational Operators State-of-the-art is limited to three Internal special cases Reversible Mathematical Functions Array Manipulation Language (AML) External Output R1,12 R2, 34 Currently no known techniques for general fine-grained lineage tracing??? Cui et al Woodruff & stonebraker A.P.Marathe
5 Contributions Enable fine-grained external lineage tracing for any arbitrary program without requiring Domain expertise Understanding the semantics of the operation Source code Computed lineage is accurate (no false positives) Lineage is derived directly from program execution.
6 Outline Introduction Lineage tracing Case study Conclusion
7 Our approach Automatically trace lineage using only binary executables. Monitor the data flow during program execution. As the program is executed, the lineage of each variable is traced. Each binary instruction is modified to keep track of the data/control dependencies generated by the instruction.
8 Tracing Lineage A statement S data depends on another statement t if and only if a variable is defined at t and then used at S. A statement S control depends on a predicate statement t if and only if the execution of S is the result of the branch outcome of t Definition: Given a program execution, the data lineage of variable v at an execution point of S i, denoted as DL(v@S i ), is the set of input items that are directly or indirectly involved in the computation of the value v at S i
9 Tracing example 1: y=3; 2: a1=3; 3: b1=4; 4: if(y>2) 5: x = a1 + b1; DL( x@5) = ( DL( a1@5) Υ DL( b1@5)) Υ DL(4) = DL( a1@ 2) Υ DL( b1@3) Υ DL( 4) = DL( a1@ 2) Υ DL( b1@3) Υ DL( At Statement 5, x depends upon a1,b1 (data dependency) and y (control dependence) Thus, the lineage of x is the union of the lineages of a1, b1 and y
10 Deriving lineage Let s i : dest =? t j : f( use, use 1,, use n ) be the executed statement instance s i, which assigns a value to variable dest by using variables use, use 1,, use n and s i control depends on t j. Let DEF(x) be the latest statement instance that defines x. U DL(dest@s i ) = ( DL(use i ))U DL(t j ) x = DL(t j )U( U DL(use x )) x.def(use x ) φ U( U {use x })) x.def(use x )=φ
11 Instrumenting the code We use an open-source instrumentation kernel called Valgrind The lineage is typically set data and is stored using a structure called robdd which is optimized for set operations. Shadow memory (SM) stores the lineage sets associated with variables in stack/heap and shadow register file (SRF) stores lineage sets for variables in registers
12 Instrumenting the code Example instrumentation A=(int*) malloc(1) SM(A) = malloc_in_shadow(1) add (x884dc), eax mov SM[x884dc] U SRF(eax), SRF(eax)
13 Architecture We have developed a prototype system based on Valgrind engine to trace finegrained lineage code x86 binary input Valgrind Kernel instrumented code event Instrumenter Runtime bdd bdd robdd output Lineage Repository lineage
14 Outline Introduction Lineage tracing Case study Conclusion
15 Case study: Cancer biomarker discovery Cancer Digestion Isotope Labeling Label1 Normal Digestion Isotope Labeling Label2 1:1 mix LC-MS Doublet Doublet De-Isotope
16 De-isotoping Seq1: ATLNELVEYVSTNR Figure to show challenge of de-isotoping
17 De-isotoping intenisty
18 De-isotoping Seq1: ATLNELVEYVSTNR Seq2: ITCAELR intenisty
19 De-isotope algorithm Complex, mostly heuristics Numerous parameters picked by experts Validity of results can be affected by choice of parameters Identifying a reverse function is impossible, even for experts. Using state-of-the-art algorithm.
20 De-isotope result 25 Pep 1 (H) (ν) Pep 1 (L) (µ) α β γ δ ε Pep 2 (L) (ξ) ζ η θ Pep 2 (H) (ο) ι κ λ
21 Fine-grained lineage Pep 1 (H) (ν) α β γ δ ε ζ η θ ι κ λ Pep 1 (L) (µ) Pep 2 (L) (ξ) Pep 2 (H) (ο)
22 Case study External fine-grained lineage is crucial for our biomarker discovery application Our technique enabled experts to detect errors assess the reliability of data identify false positives identify program limitations
23 Detect error β α γ δ ε ζ η θ ι κ λ µ ν ξ ο π ρ ς σ +4 τ +4 υ +4 φ α β γ δ ε ζ η θ ι ν µ λ κ ξ ο π ρ ς σ +3 τ +3 υ +3 φ
24 Identifying false positives δ 15 α β ε 1 5 γ ζ η θ ι κ λ
25 Program limitations ω ο ι η θ ρ λ α β γ κ δ ε ζ µ ν ξ π ς σ τ υ +2 φ +1 χ +1 ψ ω χ +2 ω υ +1 Ω +1 φ +1 χ +1 ψ υ +2 ψ
26 Performance cluto deisotope apriori rainbow lemur Image processing Auto-class Tracing/ valgrind Tracing (sec) Valgrind (sec) Original (sec) benchmark
27 Memory consumption Benchmark Orig(MB) BDD(MB) Tracing(MB) Auto-class Image processing lemur rainbow apriori deisotope cluto
28 Outline Introduction Tracing lineage Case study Conclusion
29 Conclusion This is the first work that can trace external general fine-grained lineage Advantages Fully automated Does not require user input or domain knowledge Does not need source code The lineage is accurate
30 Conclusion Disadvantage Performance Tracing lineage incurs a slowdown but acceptable for applications in need of lineage Part of the overhead is caused by Valgrind, other industrial instrumentation engines such as dbt (Intel) and valcun (Mirosoft) incur less overhead.
Tracing Lineage Beyond Relational Operators
Purdue University Purdue e-pubs Department of Computer Science Technical Reports Department of Computer Science 2007 Tracing Lineage Beyond Relational Operators Mingwu Zhang Xiangyu Zhang Purdue University,
More informationQuick Start with CASSY Lab. Bi-05-05
Quick Start with CASSY Lab Bi-05-05 About this manual This manual helps you getting started with the CASSY system. The manual does provide you the information you need to start quickly a simple CASSY experiment
More informationTabella dei caratteri ASCII e UNICODE
Appendice 1: ausiliaria Tabella dei caratteri ASCII e UNICODE formato di stampa: A4 APP_1A_IT_R3.0.docx 1 di 9 Indice 1 TABELLE DEI CARATTERI... 3 Caratteri ASCII... 3 Lettere greche... -4 APP_1A_IT_R3.0.docx
More informationFor personal use only
ACN: 062 284 084 ASX Code: SYS!! #! % &!! ( )!!!!&%!&!! + % % &! &! %,!% &%!!% &% &!%!! &!!% && &,!%! %, &%! & &&!%!! &!% &!! ( &!% &!!!!!!%. / 0 10 1 % 2! & &!,,, & ( & ! 3! (4&!! (!!% & &! &5 )!!!!4
More informationKristoffer H. Rose. Version /01/07
Summary of qsymbols Kristoffer H. Rose Version 1.12 1997/01/07 Abstract qsymbols is a L A TEX [1] package defining systematic mnemonic abbreviations, starting with a single open quote for symbols, and
More informationMyriad Pro Light. Lining proportional. Latin capitals. Alphabetic. Oldstyle tabular. Oldstyle proportional. Superscript ⁰ ¹ ² ³ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹,.
Myriad Pro Light Latin capitals A B C D E F G H I J K L M N O P Q R S T U V W X Y Z & Æ Ł Ø Œ Þ Ð Á Â Ä À Å Ã Ç É Ê Ë È Í Î Ï Ì İ Ñ Ó Ô Ö Ò Õ Š Ú Û Ü Ù Ý Ÿ Ž Ă Ā Ą Ć Č Ď Đ Ě Ė Ē Ę Ğ Ģ Ī Į Ķ Ĺ Ľ Ļ Ń Ň Ņ
More informationfile:///export/home/apostolo/work/tex/mkindex/mkgrki...
The correct generation and typesetting of an index for a Greek document prepared with LaTeX is not a trivial task at all. First of all, the program makeindex cannot handle Greek letters, but even if the.idx
More informationPalatino. Palatino. Linotype. Palatino. Linotype. Linotype. Palatino. Linotype. Palatino. Linotype. Palatino. Linotype
Copyright 2013 Johanna Corsini Arts 79 Typography 1 Sources: http://en.wikipedia.org/wiki/ http://en.wikipedia.org/wiki/typography By Johanna Corsini P a a P o l t a a n L P i l t n a i o a o y l t n n
More information2. Unlock the Customization Features: The Edit Button Click the "Edit" button on the Dashboard Home Page to unlock the customization features.
1. Introduction: Customize Content for Your Students The Garland Science Learning System (GSLS) is completely customizable. You can edit, delete, or add content to create a unique learning experience for
More information3D-reconstruction and evaluation of MR images of children with juvenile idiopathic arthritis (JIA)
Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2012 3D-reconstruction and evaluation of MR images of children with juvenile
More informationCOLORPOP! User Guide
COLORPOP! User Guide Copyright 2018 Newell Rubbermaid Europe, LLC. All rights reserved. Rev. 6/18 No part of this document may be reproduced or transmitted in any form or by any means or translated into
More informationKbdKaz 500 layout tables
a ao a ao a o o o o o a a oo A o a a o a a oa ao oo A o a a o oa ao A a o a oa oa ao o a a a a o a A a a A ˆ a a A ˇ ao a a A a a A o Ao a a A Ao a o a a A ao a o a a A α a A a a a A o o a a A A a a A
More informationNews from the Wrapper
News from the Wrapper Gesellschaft für Schwerionenforschung mbh Darmstadt, Germany JACoW Team Meeting 2004 Knoxville, Tennessee November 7, 2004 What is still the same? What is still the same? What has
More informationBMC Evolutionary Biology 2008, 8:89
BMC Evolutionary Biology This Provisional PDF corresponds to the article as it appeared upon acceptance. Fully formatted PDF and full text (HTML) versions will be made available soon. Selection against
More informationThe package paresse. Le TEXnicien de surface February 16, 2013
The package paresse Le TXnicien de surface le.texnicien.de.surface@wanadoo.fr February 16, 2013 Abstract This package implements an example from T. Lachand-Robert in [1]. It provides a means of typing
More informationr v i e w o f s o m e r e c e n t d e v e l o p m
O A D O 4 7 8 O - O O A D OA 4 7 8 / D O O 3 A 4 7 8 / S P O 3 A A S P - * A S P - S - P - A S P - - - - L S UM 5 8 - - 4 3 8 -F 69 - V - F U 98F L 69V S U L S UM58 P L- SA L 43 ˆ UéL;S;UéL;SAL; - - -
More informationThe LibertinusT1 Math Package
The LibertinusT1 Math Package Michael Sharpe September 20, 2018 This package is a LATEX math package to accompany the LATEX Libertine text package, serving as an alternative to newtxmath with the libertine
More informationUniversity Senate 6 May :30 PM Wang Lecture Hall 2
University Senate 6 May 2013 3:30 PM Wang Lecture Hall 2 I. Approval of the Agenda II. Approval of the Minutes from April III. Report from the President of the Senate IV. Report on D1 Athletics (J. Fiore)
More informationCharacter Entity References in HTML 4 and XHTML 1.0
1 of 12 2/2/2009 2:55 PM Character References in HTML 4 and XHTML 1.0 Here is a set of tables containing the 252 allowed entities in HTML 4 and XHTML 1.0, as described in section 24 of the official HTML
More informationSharePoint Wiki Plus Getting Started
SharePoint Wiki Plus Getting Started Installation & User Guide Copyright 2005-2008 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 148 Castle Rock Dr. Richmond Hill, Ontario L4C
More informationUniversity of St Andrews Cardiff Business School!!! # % # &! (!#! ) +!!!,#!,! %,!! # 6!! 7.! % %788! 7 9 8! 8! (:0; <= (
Reid, Gavin C. and Smith, Julia A. (2005) Venture capital investor behaviour in the backing of UK high technology firms : financial reporting and the level of investment. Discussion paper. Centre for Research
More informationALLEGRIA USER MANUAL. François Schiettekatte, Martin Chicoine Université de Montréal May 13, 2004
ALLEGRIA USER MANUAL François Schiettekatte, Martin Chicoine Université de Montréal May 13, 2004 1 Contents Introduction 3 I SpectrumExtractor 4 1 Data files format 4 2 Obtaining energy spectra with SpectrumExtractor
More informationHur gör man för att skriva klassisk grekiska?
Hur gör man för att skriva klassisk grekiska? I operativsystemet Win10 byter man språk med en enkel knapptryckning i aktivitetsfeltet: SWE > ΕΛ Man kan ladda ner ett lämpligt typsnitt, SBL Bib Lit, på
More informationmdput for mathematical typesetting with Adobe Utopia Paul Pichaureau January 29, 2006
mdput for mathematical typesetting with Adobe Utopia Paul Pichaureau January 29, 2006 Contents 1 Introduction 1 1.1 Requirements.................................................... 1 1.2 The name of the
More informationFREE. 3-in-1 Printer... Labeling, Bar Code, and Heat Shrink Tube Identification
3-in-1 Printer... Labeling, Bar Code, and Heat Shrink Tube Identificati 3 Year FREE Printer Warranty Industrial printer works like a Bee solving your labeling needs in the factory, warehouse, laboratory,
More informationAlways there to help you. Register your product and get support at M110. Question? Contact Philips.
Always there to help you Register your product and get support at www.philips.com/support Question? Contact Philips M110 User manual Contents 1 Important safety instructions 2 2 Your phone 3 What is in
More information! " # $ % & ' ( ) * +, -. / : ; < =
! " # $ % & ' ( ) 32 33 34 35 36 37 38 39 40 41 * +, -. / 0 1 2 3 42 43 44 45 46 47 48 49 50 51 4 5 6 7 8 9 : ; < = 52 53 54 55 56 57 58 59 60 61 >? @ A B C D E F G 62 63 64 65 66 67 68 69 70 71 H I J
More informationTernary Butterfly Subdivision
Ternary Butterfly Subdivision Ruotian Ling a,b Xiaonan Luo b Zhongxian Chen b,c a Department of Computer Science, The University of Hong Kong b Computer Application Institute, Sun Yat-sen University c
More information4th of July
IDNs in Greece Segredakis Vaggelis Administrator Registry of [.gr] Domain Names Institute of Computer Science Foundation for Research and Technology Hellas Email: segred@ics.forth.gr IDN Facts The registration
More informationTopic Training Engineering Report
Topic Training Engineering Report Topic Training Engineering Report All information in this document is subject to modification without prior notice. No part of this manual may be reproduced, stored in
More informationDocumentation for the betababel.sty package
Documentation for the betababel.sty package Felix G. Berkemeier 2005/07/10 Abstract The betababel package extends the polutonikogreek option of the babel package. It provides the possibility to directly
More informationWindows Memory Forensics and Direct Kernel Object Manipulation. Jesse Kornblum
Windows Memory Forensics and Direct Kernel Object Manipulation Jesse Kornblum Outline Introduction The Kernel Direct Kernel Object Manipulation Standard DKOM Devious DKOM Better Magic Relations Between
More informationNutthapat Kaewrattanapat. Lecture in Principle of Web Design
ASCII CODE (ASCII CHARACTERS) ls should display in files using charsets ISO 8859-1 or UTF-8. [ " ] quotation mark [name: "] [number: "] [ & ] ampersand [name: &] [number: &] [ < ] less than [name:
More informationCost Effective Forward Tracing Data Lineage
Purdue University Purdue e-pubs Department of Computer Science Technical Reports Department of Computer Science 2007 Cost Effective Forward Tracing Data Lineage Mingwu Zhang Xiangyu Zhang Purdue University,
More informationSharePoint Wiki Plus User Guide
SharePoint Wiki Plus User Guide Installation & User Guide Copyright 2005-2008 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 148 Castle Rock Dr. Richmond Hill, Ontario L4C 5K5,
More informationProject Fortress: A Multicore Language for Scientists and Engineers
Project Fortress: A Multicore Language for Scientists and Engineers Sukyoung Ryu Department of Computer Science Korea Advanced Institute of Science and Technology December 13, 2009 Copyright c 2009 Sun
More informationIntroduction to Computer Science
Introduction to Computer Science Jürgen Schönwälder Jacobs University Bremen December 22, 2017 http://cnds.eecs.jacobs-university.de/courses/ics-2017 Jürgen Schönwälder (Jacobs University Bremen) Introduction
More informationData Diffusion: Dynamic Resource Provision and Data-Aware Scheduling for Data-Intensive Applications
Data Diffusion: Dynamic Resource Provision and Data-Aware Scheduling for Data-Intensive Applications Ioan Raicu, Yong Zhao 2, Ian Foster,3,4, Alex Szalay 5 iraicu@cs.uchicago.edu, yozha@microsoft.com,
More informationIntroduction to Computer Science
Introduction to Computer Science Jürgen Schönwälder Jacobs University Bremen December 7, 2018 https://cnds.jacobs-university.de/courses/ics-2018 Jürgen Schönwälder (Jacobs University Bremen) Introduction
More informationSharePoint Wiki Plus User Guide
SharePoint Wiki Plus User Guide Installation & User Guide Copyright 2005-2012 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 50 McIntosh Drive, Unit 109 Markham, Ontario ON L3R
More information1. Benchmarks. 1.1 TailBench: A Benchmark Suite and Evaluation Methodology for Latency-Critical Applications [IISWC 2016]
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ ΣΧΟΛΗ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΜΗΧΑΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΤΟΜΕΑΣ ΤΕΧΝΟΛΟΓΙΑΣ ΠΛΗΡΟΦΟΡΙΚΗΣ ΚΑΙ ΥΠΟΛΟΓΙΣΤΩΝ Ε Ρ Γ Α Σ Τ Η Ρ Ι Ο Υ Π Ο Λ Ο Γ Ι Σ Τ Ι Κ Ω Ν Σ Υ Σ Τ Η Μ Α Τ Ω Ν www.
More informationTyped Lambda Calculus
Department of Linguistics Ohio State University Sept. 8, 2016 The Two Sides of A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a system of notation for functions
More informationSharePoint Wiki Plus User Guide
SharePoint Wiki Plus User Guide Installation & User Guide Copyright 2005-2009 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 50 McIntosh Drive, Unit 109 Markham, Ontario ON L3R
More informationDistributed and Centralized Hybrid CSMA/CA-TDMA Schemes for Single-Hop Wireless Networks
Distributed and Centralized Hybrid CSMA/CA-TDMA Schemes for Single-Hop Wireless Networks Bharat Shrestha, Ekram Hossain, and Kae Won Choi arxiv:40.5528v [cs.ni] 22 Jan 204 Abstract The strength of carrier-sense
More informationCopyright c 2008 Sun Microsystems, Inc. ( Sun ). All rights are reserved by Sun except as expressly stated as follows. Permission to make digital or
Copyright c 2008 Sun Microsystems, Inc. ( Sun ). All rights are reserved by Sun except as expressly stated as follows. Permission to make digital or hard copies of all or part of this work for personal
More informationQuick Start Instructions on using MyOMLab with the JAWS Screen Reader*
Quick Start Instructions on using MyOMLab with the JAWS Screen Reader* To work on assignments in MyOMLab with JAWS, follow these steps to turn on the Automatically Detect for Accessibility Setting: 1.
More informationEstimating Quantiles from the Union of Historical and Streaming Data
Estimating Quantiles from the Union of Historical and Streaming Data Sneha Aman Singh, Iowa State University Divesh Srivastava, AT&T Labs - Research Srikanta Tirthapura, Iowa State University Quantiles
More informationTowards Automated Collection of Application-Level Data Provenance
Towards Automated Collection of Application-Level Data Provenance Dawood Tariq Maisem Ali Ashish Gehani SRI International Abstract Gathering data provenance at the operating system level is useful for
More informationGeneral theory of rectilinear ray systems
Allgemeine Theorie der gradlinigen Strahlensysteme J. f. reine u. angew. Math. 57 (860) 89-30. General theory of rectilinear ray systems (By E. E. Kummer in Berlin) Translated by D. H. Delphenich Up to
More informationA Family of Recompositions of the Penrose Aperiodic Protoset and its Dynamic Properties
Rose-Hulman Undergraduate Mathematics Journal Volume 12 Issue 2 Article 7 A Family of Recompositions of the Penrose Aperiodic Protoset and its Dynamic Properties Vivian Olsiewski Healey University of Notre
More informationIntroduction to Computer Science
Introduction to Computer Science Jürgen Schönwälder December 22, 2017 Abstract This memo contains annotated slides for the course Introduction to Computer Science. The material is inspired by the course
More informationConvicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach
Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu Department of Computer Sciences Purdue University {zlin, xyzhang, dxu}@cs.purdue.edu
More informationAn Efficient Transformation for Klee s Measure Problem in the Streaming Model Abstract Given a stream of rectangles over a discrete space, we consider the problem of computing the total number of distinct
More informationLocating Faults Through Automated Predicate Switching
Locating Faults Through Automated Predicate Switching Authored by Xiangyu Zhang, Neelam Gupta, Rajiv Gupta The University of Arizona ICSE 2006 Presented by Jing Pu Authors 1 Neelam Gupta The University
More informationGraphical Models & HMMs
Graphical Models & HMMs Henrik I. Christensen Robotics & Intelligent Machines @ GT Georgia Institute of Technology, Atlanta, GA 30332-0280 hic@cc.gatech.edu Henrik I. Christensen (RIM@GT) Graphical Models
More informationComputing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes
Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Marta Pujol and Mercè Villanueva Combinatorics, Coding and Security Group (CCSG) Universitat Autònoma de Barcelona (UAB) VIII JMDA, Almería
More informationProbabilistic systems a place where categories meet probability
Probabilistic systems a place where categories meet probability Ana Sokolova SOS group, Radboud University Nijmegen University Dortmund, CS Kolloquium, 12.6.6 p.1/32 Outline Introduction - probabilistic
More informationAn Efficient Clustering Scheme using Support Vector Methods
An Efficient Clustering Scheme using Support Vector Methods J Saketha Nath 1 and S K Shevade 2 1 Supercomputer Education and Research Center, Indian Institute of Science, Bangalore-5612, INDIA. Saketh.Nath@gmail.com
More informationTyped Lambda Calculus for Syntacticians
Department of Linguistics Ohio State University January 12, 2012 The Two Sides of Typed Lambda Calculus A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a
More informationThe XCharter Font Package
The XCharter Font Package Michael Sharpe December 14, 2017 1 Package Features The XCharter fonts are extensions of the Bitstream Charter fonts, adding oldstyle figures (proportionally spaced only), superior
More informationQuery Access Assurance in Outsourced Databases
IEEE TRANSACTIONS ON SERVICES COMPUTING Query Access Assurance in Outsourced Databases Wangchao Le, Feifei Li Member, IEEE Abstract Query execution assurance is an important concept in defeating lazy servers
More informationExact Models for Open Field Layout Problem with l 2 and l 1 Distances
R u t c o r Research R e p o r t Exact Models for Open Field Layout Problem with l 2 and l 1 Distances Gergely Kovács a Béla Vizvári b RRR 1-2014, May 2014, RUTCOR Rutgers Center for Operations Research
More informationPerformance models for master/slave parallel programs
Performance models for master/slave parallel programs PASM 2004 Lucas Baldo Leonardo Brenner Luiz G. Fernandes Paulo Fernandes Afonso Sales {lbaldo, lbrenner, gustavo, paulof, asales}@inf.pucrs.br. PUCRS
More informationExtended user documentation
Always there to help you Register your product and get support at www.philips.com/support Question? Contact Philips M345 Extended user documentation Contents 1 Important safety instructions 3 2 Your phone
More informationExtended user documentation
Always there to help you Register your product and get support at www.philips.com/support Question? Contact Philips M330 M335 Extended user documentation Contents 1 Important safety instructions 3 2 Your
More informationExtended user documentation
Always there to help you Register your product and get support at www.philips.com/welcome Question? Contact Philips D210 D215 Extended user documentation Contents 1 Important safety instructions 3 2 Your
More information10 years of OpenType math font development
Overview Choices of math fonts Completeness Design consistency Testing Summary 10 years of OpenType math font development Ulrik Vieth Stuttgart, Germany TUG@BachoT E X 2017 Brodnica, Poland Overview Choices
More informationA Comparison of Lauritzen-Spiegelhalter, Hugin, and Shenoy-Shafer Architectures for Computing Marginals of Probability Distributions
Appeared in: G. F. Cooper & S. Moral (eds.), Uncertainty in Artificial Intelligence, Vol. 14, 1999, pp. 328--337, Morgan Kaufmann, San Francisco, CA. A Comparison of Lauritzen-Spiegelhalter, Hugin, and
More informationEdge and local feature detection - 2. Importance of edge detection in computer vision
Edge and local feature detection Gradient based edge detection Edge detection by function fitting Second derivative edge detectors Edge linking and the construction of the chain graph Edge and local feature
More informationSémantique des Langages de Programmation (SemLP) DM : Region Types
Sémantique des Langages de Programmation (SemLP) DM : Region Types I) Submission Submission Date : 21/05/2017 Submission Format : Submit a virtual machine (.ova) 1 with 1. an executable of the interpreter,
More informationHP Certified Professional
HP Certified Professional HP ProLiant Server Maintenance HP2-061 Exam Datasheet Audience This exam is for warranty and service delivery personnel with at least 6 months experience. These individuals perform
More informationRegularized Robust Coding for Face Recognition
Regularized Robust Coding for Face Recognition Meng Yang a, Student Member, IEEE, Lei Zhang a,, Member, IEEE Jian Yang b, Member, IEEE, and David Zhang a, Fellow, IEEE a Dept. of Computing, The Hong Kong
More informationTSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption
future internet Article TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption Jinsheng Zhang 1, Qiumao Ma 1, Wensheng Zhang 1, * and Daji Qiao 2 1 Department of Computer Science,
More informationPerformance Evaluation of an Interior Point Filter Line Search Method for Constrained Optimization
6th WSEAS International Conference on SYSTEM SCIENCE and SIMULATION in ENGINEERING, Venice, Italy, November 21-23, 2007 18 Performance Evaluation of an Interior Point Filter Line Search Method for Constrained
More informationHuman Action Attribute Learning From Video Data Using Low-Rank Representations
1 Human Action Attribute Learning From Video Data Using Low-Rank Representations Tong Wu, Student Member, IEEE, Prudhvi Gurram, Senior Member, IEEE, Raghuveer M. Rao, Fellow, IEEE, and Waheed U. Bajwa,
More informationTHE COCHINEAL FONT PACKAGE
THE COCHINEAL FONT PACKAGE MICHAEL SHARPE Cochineal is a fork of Crimson, a remarkable creation of Sebastian Kosch inspired by oldstyle font designers. The name Cochineal is intended to suggest that, while
More informationComparison of Interior Point Filter Line Search Strategies for Constrained Optimization by Performance Profiles
INTERNATIONAL JOURNAL OF MATHEMATICS MODELS AND METHODS IN APPLIED SCIENCES Comparison of Interior Point Filter Line Search Strategies for Constrained Optimization by Performance Profiles M. Fernanda P.
More informationAlways there to help you. Register your product and get support at CD280 CD285. Question? Contact Philips.
Always there to help you Register your product and get support at www.philips.com/welcome Question? Contact Philips CD280 CD285 User manual Contents 1 Important safety instructions 5 2 Your CD280/CD285
More informationExperimental Evaluation of Using Dynamic Slices for Fault Location
Experimental Evaluation of Using Dynamic Slices for Fault Location Xiangyu Zhang Haifeng He Neelam Gupta Rajiv Gupta Department of Computer Science The University of Arizona Tucson, Arizona 85721 {xyzhang,hehf,ngupta,gupta}@cs.arizona.edu
More informationCost-efficient QoS-Aware Data Acquisition Point Placement for Advanced Metering Infrastructure
Cost-efficient QoS-Aware Data Acquisition Point Placement for Advanced Metering Infrastructure Fariba Aalamifar and Lutz Lampe Department of Electrical and Computer Engineering, The University of British
More informationWATERMARKING, without any exception, has been
1 A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-all Usability Constraints M. Kamran, Sabah Suhail, and Muddassar Farooq Abstract Ownership protection on
More informationused to describe all aspects of imaging process: input scene f, imaging system O, and output image g.
SIMG-716 Linear Imaging Mathematics I 03 1 Representations of Functions 1.1 Functions Function: rule that assigns one numerical value (dependent variable) to each of a set of other numerical values (independent
More informationThe Extended Algebra. Duplicate Elimination. Sorting. Example: Duplicate Elimination
The Extended Algebra Duplicate Elimination 2 δ = eliminate duplicates from bags. τ = sort tuples. γ = grouping and aggregation. Outerjoin : avoids dangling tuples = tuples that do not join with anything.
More informationarxiv: v2 [cs.ds] 30 Sep 2016
Synergistic Sorting, MultiSelection and Deferred Data Structures on MultiSets Jérémy Barbay 1, Carlos Ochoa 1, and Srinivasa Rao Satti 2 1 Departamento de Ciencias de la Computación, Universidad de Chile,
More informationMonitoring Interfaces for Faults
Monitoring Interfaces for Faults Aleksandr Zaks RV 05 - Fifth Workshop on Runtime Verification Joint work with: Amir Pnueli, Lenore Zuck Motivation Motivation Consider two components interacting with each
More informationScalable and Precise Dynamic Datarace Detection for Structured Parallelism
Scalable and Precise Dynamic Datarace Detection for Structured Parallelism Raghavan Raman Rice University raghav@rice.edu Jisheng Zhao Rice University jisheng.zhao@rice.edu Vivek Sarkar Rice University
More informationGiovanni De Micheli. Integrated Systems Centre EPF Lausanne
Two-level Logic Synthesis and Optimization Giovanni De Micheli Integrated Systems Centre EPF Lausanne This presentation can be used for non-commercial purposes as long as this note and the copyright footers
More informationDrawing Outer 1-planar Graphs with Few Slopes
Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 19, no. 2, pp. 707 741 (2015) DOI: 10.7155/jgaa.00376 Drawing Outer 1-planar Graphs with Few Slopes Emilio Di Giacomo Giuseppe Liotta
More informationWalking Location Algorithms
University of West Bohemia in Pilsen Department of Computer Science and Engineering Univerzitní 8 30614 Pilsen Czech Republic Walking Location Algorithms State of the Art and Concept of PhD. Thesis Roman
More informationEfficient, Scalable, and Provenance-Aware Management of Linked Data
Efficient, Scalable, and Provenance-Aware Management of Linked Data Marcin Wylot 1 Motivation and objectives of the research The proliferation of heterogeneous Linked Data on the Web requires data management
More informationLab 07: Maximum Likelihood Model Selection and RAxML Using CIPRES
Integrative Biology 200, Spring 2014 Principles of Phylogenetics: Systematics University of California, Berkeley Updated by Traci L. Grzymala Lab 07: Maximum Likelihood Model Selection and RAxML Using
More informationModel-Driven Matching and Segmentation of Trajectories
Model-Driven Matching and Segmentation of Trajectories Jiangwei Pan (Duke University) joint work with Swaminathan Sankararaman (Akamai Technologies) Pankaj K. Agarwal (Duke University) Thomas Mølhave (Scalable
More informationA Semi-group of Hashing Functions & Hash Tables
A Semi-group of Hashing Functions & Hash Tables Arthur Hughes University of Dublin, Trinity College, Dublin, Ireland e-mail: Arthur.P.Hughes@cs.tcd.ie January 19, 1997 Abstract A model of a hash table
More informationComputing Aggregate Functions in Sensor Networks
Computing Aggregate Functions in Sensor Networks Antonio Fernández Anta 1 Miguel A. Mosteiro 1,2 Christopher Thraves 3 1 LADyR, GSyC,Universidad Rey Juan Carlos 2 Dept. of Computer Science, Rutgers University
More informationScalable Bayes Clustering for Outlier Detection Under Informative Sampling
Scalable Bayes Clustering for Outlier Detection Under Informative Sampling Based on JMLR paper of T. D. Savitsky Terrance D. Savitsky Office of Survey Methods Research FCSM - 2018 March 7-9, 2018 1 / 21
More informationConvicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach
Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach Zhiqiang Lin Xiangyu Zhang Dongyan Xu Department of Computer Sciences and CERIAS Purdue University {zlin, xyzhang,
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE
COMP 62421 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Querying Data on the Web Date: Wednesday 24th January 2018 Time: 14:00-16:00 Please answer all FIVE Questions provided. They amount
More informationMULTI-RESOLUTION STATISTICAL ANALYSIS ON GRAPH STRUCTURED DATA IN NEUROIMAGING
MULTI-RESOLUTION STATISTICAL ANALYSIS ON GRAPH STRUCTURED DATA IN NEUROIMAGING, Vikas Singh, Moo Chung, Nagesh Adluru, Barbara B. Bendlin, Sterling C. Johnson University of Wisconsin Madison Apr. 19, 2015
More informationCSE-321 Programming Languages 2010 Final
Name: Hemos ID: CSE-321 Programming Languages 2010 Final Prob 1 Prob 2 Prob 3 Prob 4 Prob 5 Prob 6 Total Score Max 18 28 16 12 36 40 150 There are six problems on 16 pages, including two work sheets, in
More informationA parallel iterative approach for the Stokes Darcy coupling
A parallel iterative approach for the Stokes Darcy coupling Marco Discacciati*, Alfio Quarteroni**, Alberto Valli*** * Institute of Analysis and Scientific Computing, EPFL ** Institute of Analysis and
More information