Parallel MATLAB at FSU: Task Computing
|
|
- Jonas Paul
- 5 years ago
- Views:
Transcription
1 Parallel MATLAB at FSU: Tak John Burkardt Department of Scientific Florida State Univerity... 1:30-2:30 Thurday, 07 April Dirac Science Library... jburkardt/preentation/... fu 2011 matlab tak.pdf Florida State Univerity 1 / 54
2 Parallel MATLAB: Tak Tak QUAD Example KNAPSAK Example ELL DETETION Example RANDOM WALK Example oncluion Florida State Univerity 2 / 54
3 Tak : not PARFOR or SPMD In lat week lecture, I talked about MATLAB parfor and pmd command. With parfor, a ingle program and a ingle et of hared data were involved. When the client reached a parallel loop, extra worker would ait. With pmd, we aw a ingle program, but one which wa divided between command to the client and command to the worker. Moreover, the client and worker had eparate memory pace. Data could be moved only by explicit command. Depite their difference, programming with parfor and pmd have omething in common; the client and the worker are imultaneouly executing a program. Florida State Univerity 3 / 54
4 Tak : Decription Today, we will conider a third technique, tak c, in which a big job i divided into very independent tak; Each tak run on the mallet addreable type of proceor: a ingle core on a dektop or a ingle node on a cluter. Tak run in any order, at any time, on any available proceor. We ll aume each tak execute the ame MATLAB function. Each tak ha it own memory. Each tak i given a et of input; it doe no further communication until it computation i complete, when it return it reult. When all the tak are completed, the collection of reult can be examined, analyzed or plotted. Florida State Univerity 4 / 54
5 Tak : Decription You could et up 100 tak, for intance, a a ingle job. For each tak, MATLAB locate an available proceor, enure that the tak receive it input, and recover the output. Once all the tak are completed, the output can be examined. Tak c allow you to organize a computation that ha many independent part. If many proceor are available, many tak will run at the ame time, but you don t worry about the precie chedule. Tak c i a handy way of filling up pare computer time with bite ized piece of a computation whoe final reult can be determined once all the piece have been completed. Tak can run on your dektop or on a cluter. Florida State Univerity 5 / 54
6 Tak : Example Tak c example: earch: divide the earch pace among tak; Monte arlo: give each tak a unique random number eed; ummation: any tak involving multiple ummation, multiplication, or other operation (quadrature) image proceing: operation that can be carried out over part of the image, or frame of an animation; ray tracing; Florida State Univerity 6 / 54
7 Parallel MATLAB: Tak Tak QUAD Example KNAPSAK Example ELL DETETION Example RANDOM WALK Example oncluion Florida State Univerity 7 / 54
8 QUAD: Approximate integration Here we ue evenly paced ample point and equal weight. Other cheme vary the pacing or weight, or randomize abcia. Florida State Univerity 8 / 54
9 QUAD: Approximate integration We recall our favorite problem, the approximation of an integral by a weighted um of function value: Z I = b f (x) dx a Q= N X wi f (xi ) i=1 We could eaily regard thi computation a, ay, 4 tak: Q = Q1 + Q2 + Q3 + Q4 where each Qi could be computed independently. The only communication required would come at the end, when the Qi mut be combined to form Q. Florida State Univerity 9 / 54
10 QUAD: Tak and Job Our baic tak etimate the integral over a ubinterval [ai, bi ] uing ni point. We can write a MATLAB function to do thi: qi = quad_tak ( ni, ai, bi ) Then our job i made up of four tak (aume [a, b] = [0,1]!): tak 1 integrate from 0/4 to 1/4 tak 2 integrate from 1/4 to 2/4 tak 3 integrate from 2/4 to 3/4 tak 4 integrate from 3/4 to 4/4 Each tak can be expreed by pecifying the appropriate input argument to quad tak. Florida State Univerity 10 / 54
11 QUAD: QUAD TASK function qi = quad_tak ( ni, ai, bi ) x = linpace ( ni, ai, bi ); qi = h * ( 0.5 * f ( x(1) )... + um ( f ( x(2:ni-1) ) ) * f ( x(ni) ) ); return end Florida State Univerity 11 / 54
12 QUAD: Local Execution of a Job On a dektop, we create a job, define it tak, and ubmit it: job = createjob ( configuration, local ); n = ; ni = 25001; for tak = 1 : 4 ai = ( tak - 1 ) / 4; bi = tak / 4; tak_id = createtak ( 1, { ni, ai, bi } ) end ubmit ( job ); wait ( job ); <-- Wait until all tak have completed. (The third argument to createtak, ( 1 ), report the number of output produced by quad tak). Florida State Univerity 12 / 54
13 QUAD: ollecting Reult Our final integral etimate Q i the um of the individual reult. If qi i the name of the output from the quad tak function, the load command can return a cell array containing the value of qi returned by each tak; qi = load ( job, qi ); qi = cell2mat ( qi ); q = um ( qi ); Florida State Univerity 13 / 54
14 QUAD: FSU HP luter To run on the FSU HP cluter, we run a a imple job, and we have to create the cell array arg of input argument: n = ; tak_num = 4; ni = 1 + floor ( ( n - 1 ) / tak_num ); arg = {}; for tak = 1 : tak_num ai = ( tak - 1 ) / tak_num; bi = tak / tak_num; arg{tak} = { ni, ai, bi }; end qi = fulutermatlab ( [], [],, w,... arg ) Florida State Univerity 14 / 54
15 QUAD: FSU HP luter We have aked MATLAB to execute the four command: qi{1} qi{2} qi{3} qi{4} = = = = quad_tak quad_tak quad_tak quad_tak ( ( ( ( 0.00, 0.25, 0.50, 0.75, 0.25, 0.50, 0.75, 1.00, ); ); ); ); in any order, on any available core, while we wait. Although thee command execute independently, when they are done, we have acce to the reult. In particular, the quadrature value i: qi = cell2mat ( qi ); q = um ( qi ); Florida State Univerity 15 / 54
16 QUAD: Our implet example QUAD demontrate the feature of tak programming. The calculation i thought of a a job. The job i thought of a multiple tak, with each tak executed by the ame tak function, uing different input. The job collect the output from each tak function. The uer can wait for the job to complete (the w option), or log out and check back in later (the n option). When the job i complete, the uer can reume an interactive MATLAB eion to analyze, manipulate or plot the reult. Florida State Univerity 16 / 54
17 Parallel MATLAB: Tak Tak QUAD Example KNAPSAK Example ELL DETETION Example RANDOM WALK Example oncluion Florida State Univerity 17 / 54
18 KNAPSAK: Problem Definition In the claical problem, the object have both weight and value. For our problem, we ll jut worry about the weight! Florida State Univerity 18 / 54
19 KNAPSAK: Problem Definition Suppoe we have a knapack with a limited capacity, and a number of object of varying weight. We want to find a ubet of the object which exactly meet the capacity of the knapack. (Thi i ometime called the greedy burglar problem!) Symbolically, we are given a target value t, and a et W of n weight. We want a ubet S W o that: X t= S We don t know if a given problem ha 0, 1, or many olution. Florida State Univerity 19 / 54
20 KNAPSAK: Encoding A olution of the problem i a ubet S W. Each n-digit binary tring from 0 to 2n 1 i a code for a poible olution. For weight W={15,11,10,8,3}, target t=24, we have: ode Binary ode Indice {} {1} {2} {2,1} {3} {3,1} {3,2}... {5,4,3,2,1} S {} {3} {8} {8,3} {10} {10,3} {10,8}... {15,11,10,8,3} P Florida State Univerity 20 / 54
21 KNAPSAK: Algorithm A imple earch chooe a value of code in the range 0 to 2n 1, decode the ubet S, add the weight, and compare to t. On the 23rd tep of the earch, we have a code of 22 = binary = ubet {5,3,2}, o a weight of =33, too high. The proce of checking one code i completely independent of checking any other. One program could check all code, or we could ubdivide the range, and check the ubrange in any order and at any time. Florida State Univerity 21 / 54
22 KNAPSAK: Program to Search Entire Range function [ i_chooe, w_chooe ] = knapack ( w, t ) i_chooe = []; w_chooe = []; n = length ( w ); for code = 0 : 2^n - 1 chooe = find ( bitget ( code, 1:n ) ); if ( um ( w(chooe) ) == target ) i_chooe = chooe; w_chooe = w(chooe); return end end Florida State Univerity 22 / 54
23 KNAPSAK: A ouple Myteriou MATLAB Function The MATLAB function bitget return a vector of 0 and 1 for poition 1 to n in the counter code. Each uch binary tring decribe a unique ubet. The function find indexe the 1 in the binary tring. Thi tring of indice, called chooe, elect the ubet of w that we mut compare to t. If the ubet ha the right weight, we found a olution, and return. Florida State Univerity 23 / 54
24 KNAPSAK: The alculation i Diviible It eay to ee that we could divide thi problem up into maller problem that are worked on independently. For thi problem, it clear that the key i to take the original range of code, from 0 to 2n 1, and break it into ubrange. A ingle function can work on the problem over the retricted ubrange. In fact, we only have to lightly modify our original code to make thi new verion. Florida State Univerity 24 / 54
25 KNAPSAK: Program to Search Selected Range function [ i_chooe, w_chooe ] = knapack ( w, t, rnge ) i_chooe = []; w_chooe = []; n = length ( w ); for code = rnge(1) : rnge(2) chooe = find ( bitget ( code, 1:n ) ); if ( um ( w(chooe) ) == target ) i_chooe = chooe; w_chooe = w(chooe); return end end Florida State Univerity 25 / 54
26 KNAPSAK: Set up for Local Execution Once we have mentally divided our calculation into independent ubcalculation, we need to be able to expre thi logical fact to MATLAB. Of coure, jut a for a equential calculation we need to define the general problem parameter; However, now, we alo need to pecify the number of tak, identify the function that will execute the tak and create a cell array containing a eparate copy of the input to each tak. We feed thi information to the fulutermatlab command. Florida State Univerity 26 / 54
27 KNAPSAK: Execution on FSU HP luter w = [ , , (...more...), ]; t = ; arg = {}; i2 = -1; for tak = 1 : 4 i1 = i2 + 1; i2 = floor ( ( 2^n - 1 ) * tak / 4 ); arg{tak} = { w, t, [ i1, i2 ] }; end reult = fulutermatlab ( [], [],, w,... arg ) Florida State Univerity 27 / 54
28 KNAPSAK: Examine the reult The output argument from each tak are returned a a cell array. Tak 3 econd output (the weight) i in reult{3,2}. for tak = 1 : 4 if ( iempty ( reult{tak,1} ) ) fprintf ( 1, Tak %d found no olution.\n, tak ); ele fprintf ( 1, Tak %d found a olution:\n, tak ); dip ( Indice hoen: ); dip ( reult{tak,1} ); dip ( Weight hoen: ); dip ( reult{tak,2} ); end end Florida State Univerity 28 / 54
29 KNAPSAK: Sample Run >> knapack_fu reult = [] [1x3 double] [] [] [] [1x3 double] [] [] Tak 1 did not find a olution. Tak 2 found the following olution: weight indice weight_value Tak 3 did not find a olution. Tak 4 did not find a olution. Florida State Univerity 29 / 54
30 Parallel MATLAB: Tak Tak QUAD Example KNAPSAK Example ELL DETETION Example RANDOM WALK Example oncluion Florida State Univerity 30 / 54
31 ELLS: Problem Definition Medical reearcher can film mall group of biological cell. In ome cae, an enormou number of uch record are created. Rather than having a lab worker view each frame of film, it i poible to automatically proce the image and, for mot part, detect the cell, determine the poition of any given cell over a equence of image, and monitor the area, hape and average eparation of the cell. We will look at a imple application in which it i deired to identify cell by urrounding each one with a white boundary. If we have many image file, each can be proceed independently. Florida State Univerity 31 / 54
32 ELLS: A Typical Image Florida State Univerity 32 / 54
33 ELLS: A Typical Image with ell Identified Florida State Univerity 33 / 54
34 ELLS: Problem Definition In the KNAPSAK problem, the input and output for each tak wa a hort lit of number. For the ELLS problem, the input i really a graphic file, and the output i a tranformed graphic file. Thi mean that each tak, when it run, ha to be able to determine which unique file it hould open; it need to be able to find that file; and it need to know how to name the output file and where to place it. So while the KNAPSAK tak ued the input and output argument of the MATLAB function for their communication, the ELLS example will almot entirely be dealing with external file. Florida State Univerity 34 / 54
35 ELLS: File Name Our 99 input file are indexed in a natural way, tarting with AT3 01.tif and running up to AT3 99.tif. The output file will follow a imilar convention, but their name will tart with BT3. The input filename for a given tak can be computed: filename_input = printf ( AT3_%02d.tif, tak ); Uing the format %02d mean that mall integer will be left-padded with zero. Florida State Univerity 35 / 54
36 ELLS: The Tak Function For thi problem, the tak function will have a imple interface: function cell_tak ( tak ) It only need to know the index of the file it hould open, and it doen t return any output - at leat, not via output argument. So the body of thi function will be: generate input filename baed on tak number open input file proce data generate output filename baed on tak number write output file and we won t worry about the detail of proceing the data! Florida State Univerity 36 / 54
37 ELLS: Initializing the Job Now we need to et up the tak. Notice that there are no output reult... The output of cell tak will be the modified verion of the image file. tak_num = 99; <-- there are 99 image to proce; arg = {}; for tak = 1 : tak_num arg{tak} = { tak }; end <-- tak i work on image i. fulutermatlab ( [], [],, w,... arg ); Florida State Univerity 37 / 54
38 ELLS: Defining the Tak To keep thing imple, we aume that the file cell tak.m and all the input image file are in the current directory. Then, once we iue the fulutermatlab command, each tak, when it execute, will tart in thi directory, be able to ee the input image, and will leave it modified verion here a well. Florida State Univerity 38 / 54
39 ELLS: Sample Output for 10 Image >> cell_fu ELL_FSU: Ue MATLAB tak c on the FSU HP cluter. Here, we want to apply an image proceing operation (identify edge) to each of 10 biological image. Here i a current directory liting: AT3_01.tif AT3_04.tif AT3_07.tif AT3_10.tif AT3_02.tif AT3_05.tif AT3_08.tif cell_fu.m AT3_03.tif AT3_06.tif AT3_09.tif cell_tak.m all fulutermatlab Florida State Univerity 39 / 54
40 ELLS: Sample Output for 10 Image After fulutermatlab execute, we ee: Here i a current directory liting: AT3_01.tif AT3_02.tif AT3_03.tif AT3_04.tif AT3_05.tif AT3_06.tif AT3_07.tif AT3_08.tif AT3_09.tif AT3_10.tif BT3_01.tif BT3_02.tif BT3_03.tif BT3_04.tif BT3_05.tif BT3_06.tif BT3_07.tif Job1.in.mat BT3_08.tif Job1.jobout.mat BT3_09.tif Job1.out.mat BT3_10.tif Job1.tate.mat cell_fu.m matlab_metadata.mat cell_tak.m Job1 Job1.common.mat Job file are MATLAB log and data information. Florida State Univerity 40 / 54
41 Parallel MATLAB: Tak Tak QUAD Example KNAPSAK Example ELL DETETION Example RANDOM WALK Example oncluion Florida State Univerity 41 / 54
42 WALKS: Problem Definition The claic example of a random walk place a peron at the origin. The peron then flip a coin, and take one tep to the left or right, repeating thi proce a long a deired. Surpriingly, random walk are model of many phyical procee, and their imulation and analyi can give inight to ituation where there are no exact method available. A variation of thi problem i the elf avoiding walk in 2D, in which the peron i allowed to move over a 2D lattice, but can never viit the ame place twice. Becaue the path never croe, thi walk can be thought of a a imple model of a protein folding. Self avoiding walk of a fixed length could repreent poible hape of the protein. Florida State Univerity 42 / 54
43 WALKS: A Self Avoiding Walk / Abtract Protein Florida State Univerity 43 / 54
44 WALKS: Sampling a Huge, Unruly Space Our idea i to generate lot of different elf avoiding walk. Since the et i extremely large, we rely on the random number generator to make our choice. A different initial eed hould almot alway give a different walk. The actual number of poible walk can eaily exceed the number of poible eed! Our ample might give u an etimate for the typical ditance between the tart and end; the typical ditance of the tarting point to the boundary ; number of empty lattice point in the convex hull of the walk; the likelihood a walk will terminate early; Florida State Univerity 44 / 54
45 WALKS: The Tak ode function [ tep_num, dit ] = walk_tak ( tep_max, eed ) The tak ue eed to initialize rand() by: rand ( twiter, eed ); Then it trie taking tep max elf-avoiding tep from the origin. The walk terminate early if all four neighbor have already been viited. Otherwie, we move to a random unviited neighbor. The function return the actual number of tep taken, and the final ditance from the origin. Florida State Univerity 45 / 54
46 WALKS: Setting up the Job The job code mut decide how many walk are to be generated, and how many tep they are to take. It chooe different random number eed for each tak. tak_num = 100; tep_max = 200; arg = {}; for tak = 1 : tak_num eed = tak; arg{tak} = { tep_max, eed }; end reult = fulutermatlab ( [], [],, w,... arg ); reult = cell2mat ( reult ); Florida State Univerity 46 / 54
47 WALKS: Plotting the Reult reult = cell2mat ( reult ); <-- make numeric tep_num = reult(:,1); dit2 = reult(:,2).^2; x = log ( tep_num ); y = log ( dit2 ); <-- X = log tep <-- Y = log ditˆ2 c = polyfit ( x, y, 1 ); <-- Seek linear fit log_fit = c(1) * x + c(2); plot ( x, y, bo,... x, log_fit, r- ) Florida State Univerity 47 / 54
48 WALKS: Dit Squared = c * Step Florida State Univerity 48 / 54
49 Parallel MATLAB: Tak Tak QUAD Example KNAPSAK Example ELL DETETION Example RANDOM WALK Example oncluion Florida State Univerity 49 / 54
50 ONLUSION: Summary of Example Our example ugget the computation uitable for tak programming. QUAD i o imple we have ued it with parfor, pmd and tak. In KNAPSAK, we had to figure out an encoding, and we gave each tak a ubrange of the full problem. We had thouand of code to check, but we aigned a large ubrange of code to each tak (rather than generating thouand of tiny tak!) In ELL, each tak worked on a file, and there wa no input or output, except that each tak knew it index. In RANDOM WALK, we had to enure that each tak received a unique random eed, and we had to gather the data up at the end and plot it. Florida State Univerity 50 / 54
51 ONLUSION: Summary of Tak Tak c i ignificantly different from the uual kind of parallel c, where the computation happen concurrently. Here, each tak i aigned a ingle proceor. Tak can run equentially on the ame proceor, imultaneouly on different proceor, or in many other combination. Tak do not communicate, except that they receive an initial input from the job, and end their output reult back to it. In each of our example, the ame MATLAB function executed each tak, but a job i free to collect an arbitrary et of tak. Florida State Univerity 51 / 54
52 oncluion: Dektop Experiment If you are intereted in parallel MATLAB, the firt thing to do i get acce to the Parallel Toolbox on your multicore dektop machine, o that you can do experimentation and practice run. You can begin with ome of the ample program we have dicued today. You hould then ee whether the job and tak approach would help you in your own programming need. Florida State Univerity 52 / 54
53 oncluion: FSU HP luter If you are intereted in eriou parallel MATLAB c, you hould conider requeting an account on the FSU HP cluter, which offer MATLAB on up to 16 core. To get an account, go to and look at the information under Apply for an Account. Account on the general acce cluter are available to any FSU faculty member, or to peron they ponor. Florida State Univerity 53 / 54
54 ONLUSION: Where i it? MATLAB Parallel Toolbox Uer Guide doc/ditcomp/... ditcomp.pdf jburkardt/preentation/... fu 2011 matlab tak.pdf thee note; Gaurav Sharma, Jo Martin, MATLAB: A Language for Parallel, International Journal of Parallel Programming, Volume 37, Number 1, page 3-36, February jburkardt/m rc/m rc.html quad tak knapack tak cell detection tak random walk 2d avoid tak Florida State Univerity 54 / 54
Lecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationLecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization
Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationMidterm 2 March 10, 2014 Name: NetID: # Total Score
CS 3 : Algorithm and Model of Computation, Spring 0 Midterm March 0, 0 Name: NetID: # 3 Total Score Max 0 0 0 0 Grader Don t panic! Pleae print your name and your NetID in the boxe above. Thi i a cloed-book,
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationAnnouncements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum
Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationLecture 17: Shortest Paths
Lecture 7: Shortet Path CSE 373: Data Structure and Algorithm CSE 373 9 WI - KASEY CHAMPION Adminitrivia How to Ace the Technical Interview Seion today! - 6-8pm - Sieg 34 No BS CS Career Talk Thurday -
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationHow to. write a paper. The basics writing a solid paper Different communities/different standards Common errors
How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationBrief Announcement: Distributed 3/2-Approximation of the Diameter
Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationExploring Simple Grid Polygons
Exploring Simple Grid Polygon Chritian Icking 1, Tom Kamphan 2, Rolf Klein 2, and Elmar Langetepe 2 1 Univerity of Hagen, Praktiche Informatik VI, 58084 Hagen, Germany. 2 Univerity of Bonn, Computer Science
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationAlgorithmic Discrete Mathematics 4. Exercise Sheet
Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate
More informationBottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks.
Paring Technologie Outline Paring Technologie Outline Bottom Up paring Paring Technologie Paring Technologie Bottom-up paring Step in a hift-reduce pare top-down: try to grow a tree down from a category
More informationLaboratory Exercise 2
Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More informationQuadrilaterals. Learning Objectives. Pre-Activity
Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.
More informationSIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial
SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationThe norm Package. November 15, Title Analysis of multivariate normal datasets with missing values
The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph
More informationGeneric Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline
Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationCS 467/567: Divide and Conquer on the PRAM
CS 467/567: Divide and Conquer on the PRAM Stefan D. Bruda Winter 2017 BINARY SEARCH Problem: Given a equence S 1..n orted in nondecreaing order and a value x, find the ubcript k uch that S i x If n proceor
More informationLecture 8: More Pipelining
Overview Lecture 8: More Pipelining David Black-Schaffer davidbb@tanford.edu EE8 Spring 00 Getting Started with Lab Jut get a ingle pixel calculating at one time Then look into filling your pipeline Multiplier
More informationA Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract
A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationChapter S:II (continued)
Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationCS201: Data Structures and Algorithms. Assignment 2. Version 1d
CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More informationShortest-Path Routing in Arbitrary Networks
Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More information( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1
A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationLaboratory Exercise 2
Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on
More informationarxiv: v3 [cs.cg] 1 Oct 2018
Improved Time-Space Trade-off for Computing Voronoi Diagram Bahareh Banyaady Matia Korman Wolfgang Mulzer André van Renen Marcel Roeloffzen Paul Seiferth Yannik Stein arxiv:1708.00814v3 [c.cg] 1 Oct 2018
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationUsing Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images
2009 10th International Conference on Document Analyi and Recognition Uing Moue Feedback in Computer Aited Trancription of Handwritten Text Image Verónica Romero, Alejandro H. Toelli, Enrique Vidal Intituto
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationVariable Resolution Discretization in the Joint Space
Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationCompressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit
Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit
More informationAnalysis of slope stability
Engineering manual No. 8 Updated: 02/2016 Analyi of lope tability Program: Slope tability File: Demo_manual_08.gt In thi engineering manual, we are going to how you how to verify the lope tability for
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationCourse Updates. Reminders: 1) Assignment #13 due Monday. 2) Mirrors & Lenses. 3) Review for Final: Wednesday, May 5th
Coure Update http://www.phy.hawaii.edu/~varner/phys272-spr0/phyic272.html Reminder: ) Aignment #3 due Monday 2) Mirror & Lene 3) Review for Final: Wedneday, May 5th h R- R θ θ -R h Spherical Mirror Infinite
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More informationGray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:
Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital
More informationWeb Science and additionality
Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:
More informationOptimal Gossip with Direct Addressing
Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View
More informationA New Approach to Pipeline FFT Processor
A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture
More informationPart 1 A New Number Format: The Unum
Part 1 yr op A New Number Format: The Unum ht ig 1 Overview l- ia er at M or yl Ta an Fr ci You can t boil the ocean. Former Intel executive, reacting to the idea of unum. Incidentally, the pronunciation
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationThe Data Locality of Work Stealing
The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationA Sparse Shared-Memory Multifrontal Solver in SCAD Software
Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy
More informationCSE 250B Assignment 4 Report
CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationTesting Structural Properties in Textual Data: Beyond Document Grammars
Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document
More informationSIMIT 7. Profinet IO Gateway. User Manual
SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion
More informationOptimal Peer-to-Peer Technique for Massive Content Distribution
1 Optimal Peer-to-Peer Technique for Maive Content Ditribution Xiaoying Zheng, Chunglae Cho and Ye Xia Computer and Information Science and Engineering Department Univerity of Florida Email: {xiazheng,
More informationMid-term review ECE 161C Electrical and Computer Engineering University of California San Diego
Mid-term review ECE 161C Electrical and Computer Engineering Univerity of California San Diego Nuno Vaconcelo Spring 2014 1. We have een in cla that one popular technique for edge detection i the Canny
More informationADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR
ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR A. P. Mullery and R. F. Schauer Thoma J. Waton Reearch Center International Buine Machine Corporation Yorktown Height, New York R. Rice International Buine Machine
More informationAVL Tree. The height of the BST be as small as possible
1 AVL Tree re and Algorithm The height of the BST be a mall a poible The firt balanced BST. Alo called height-balanced tree. Introduced by Adel on-vel kii and Landi in 1962. BST with the following condition:
More informationPerformance Evaluation of search engines via user efforts measures
IJCSI International Journal of Computer Science Iue, Vol. 9, Iue 4, No, July 01 www.ijcsi.org 437 Performance Evaluation of earch engine via uer effort meaure Raeh Kumar Goutam 1 and Sanay K. Dwivedi 1
More information