Design and Analysis of a Robust Pipelined Memory System

Size: px
Start display at page:

Download "Design and Analysis of a Robust Pipelined Memory System"

Transcription

1 Design and Analysis of a obust Pipelined Memory System Hao ang 1 Haiquan (Chuk) Zhao 2 Bill Lin 1 Jun (Jim) Xu 2 1 Department of Eletrial and Computer Engineering, University of California, San Diego {wanghao,billlin}@usd.edu 2 College of Computing, Georgia Institute of Tehnology {hz,jx}@.gateh.edu Abstrat Many network proessing appliations require wirespeed aess to large data strutures or a large amount of flowlevel data, but the apaity of SAMs is woefully inadequate in many ases. In this paper, we analyze a robust pipelined memory arhiteture that an emulate an ideal SAM by guaranteeing with very high probability that the output sequene produed by the pipelined memory arhiteture is the same as the one produed by an ideal SAM under the same sequene of memory read and write operations, exept time-shifted by a fixed pipeline delay of Δ. The design is based on the interleaving of DAM banks together with the use of a reservation table that serves in part as a data ahe. In ontrast to prior interleaved memory solutions, our design is robust even under adversarial memory aess patterns, whih we demonstrate through a rigorous worstase theoretial analysis using a ombination of onvex ordering and large deviation theory. I. INTODUCTION Modern Internet routers often need to manage and move a large amount of paket- and flow-level data. Therefore, it is essential for the memory system of a router to be able to support both read and write aesses to suh data at link speeds. As link speeds ontinue to inrease, router designers are onstantly grappling with the unfortunate tradeoffs between the speed and ost of SAM and DAM. hile fitting all suh data into SAM (aess lateny typially between 5 to 15ns) is fast enough for the highest link speeds, the huge amount of SAM needed renders suh an implementation prohibitively expensive, as hundreds of megabytes or even gigabytes of storage may be needed. On the other hand, although DAM provides inexpensive bulk storage, the prevailing view is that DAM (aess lateny typially between 50 and 100ns) is too slow for providing wirespeed updates. For example, on an 40 Gb/s OC-768 link, a new paket an arrive every 8 ns, and the orresponding read or write operation to the data struture need to be ompleted within this time frame. In this work, we do away with this unfortunate tradeoff entirely, by proposing a memory system that is almost as fast as SAM, for the purpose of managing and moving paket and flow data, and almost as affordable as DAM. A. Motivation To motivate our problem, we list here two massive data strutures that need to be maintained and/or moved inside high-speed network routers. Network flow state Maintaining preise flow state information at an Internet router is essential for many network seurity appliations, suh as stateful firewalls, intrusion and virus detetion through deep paket inspetion, and network traffi anomaly analysis. For example, a stateful firewall must keep trak of the urrent onnetion state of eah flow. For signature-based deep paket inspetion appliations suh as intrusion detetion and virus detetion, per-flow state information is kept to enode partial signatures (e.g., urrent state of the finite state automata) that have been reognized. For network traffi anomaly analysis, various statistis and flow information, suh as paket and byte ounts, soure and destination address and port information, flow onnetion setup and termination times, routing and peering information, et, are reorded for eah flow during a monitoring period for later offline analysis. Indeed, the design of very large flow tables that an support fast lookups and updates has been a fundamental researh problem in network seurity. High-speed paket buffers The implementation of paket buffers at an Internet router is another essential appliation that requires wirespeed aess to large amounts of storage. Historially, the size of paket buffers have been inreasing with link speeds. To takle this problem, several designs of paket buffers based on hybrid SAM/DAM arhitetures or memory interleaved DAM arhitetures have been proposed [1], [2], [3], [4]. Although these designs are both effetive and pratial, these solutions are problem-speifi. Ideally, we would like a general memory arhiteture that is appliable to both this paket buffering problem as well as the various network flow state implementation problems. B. Our Approah In this work, we design a DAM-based memory arhiteture that an emulate a fast massive SAM module by exploiting memory interleaving. In this arhiteture, multiple DAM banks are running in parallel to ahieve the throughput of a single SAM. Our arhiteture provides fixed delay for all the read requests while ensuring the orretness of the output results of the read requests. More speifially, if a memory read operation is issued at time t, its results will be available at output exatly at time t+δ, where Δ is a fixed pipeline delay. This way, a proessor an issue a new memory operation every

2 2 yle, with deterministi ompletion time Δ yles later. No interrupt mehanism is required to indiate when a read data is ready or a write operation has ompleted for the proessor that issued the requests. ith a fixed pipeline delay, a proessor an (statially) shedule other instrutions during this time. Although this Δ is muh larger than the SAM aess lateny, router tasks an often be properly implemented to work around this drawbak thanks to the deterministi nature of this delay. For example, in paket sheduling algorithms (for provisioning Quality of Servie), the flow table needs to maintain for eah flow a timestamp that indiates whether the flow is sending faster or slower than its fair share, whih in turn determines the priorities of the pakets belonging to this flow that are urrently waiting in the queue. Using weighted fair queueing [5], when a new paket pkt arrives at time t, a read request will be issued to obtain its flow state suh as the virtual finish time of the last paket in the same flow. At time t +Δ, when the result omes bak, the virtual finish time of pkt (a per-flow variable) and the system virtual time (a global variable) an both be preisely omputed/updated beause they depend only on paket arrivals happening before or at time t, all of whih are retrieved at time t +Δ. In other words, given any time t, all flow state information needed for sheduling all pakets that arrive before or at time t are available for omputation at time t +Δ. Although all pakets are delayed by Δ using our design, we will show that this Δ is usually in the order of tens of miroseonds, whih is three orders of magnitude shorter than end-to-end propagation delays (tens of milliseonds aross the US). hile multiple DAM banks an potentially provide the neessary raw bandwidth that high-speed routers need, traditional memory interleaving solutions [6], [7] do not provide onsistent throughput reliably beause ertain memory aess patterns, espeially those that an oneivably be generated by an adversary, an easily get around the load balaning apabilities of interleaving shemes and overload a single DAM bank. Another solution proposed in [8] is a virtuallypipelined memory arhiteture that aims to mimi the behavior of a single SAM bank using multiple DAM and SAM banks. All the operations that an be stored in the buffer are provided with fixed delay using a yli buffer. However, this arhiteture assumes perfet randomization in the arrival requests to the memory banks. Under adversarial arrivals, the buffer will overflow and start dropping requests, whih greatly degrades the system performane. To guard against adversarial aess patterns, memory loations are randomly distributed aross multiple memory banks so that a near-perfet balaning of memory aess loads an be provably ahieved, even under arbitrary (inluding adversarial) memory aess patterns. This random distribution is ahieved by means of a random address permutation funtion. Note that an adversary an oneivably overload a memory bank by sending traffi that would trigger the aess of the same memory loation beause they will neessarily be mapped to the same memory bank. However, this ase an be easily handled with the help of a reservation table (whih serves in part as a data ahe) in our memory arhiteture. ith a reservation table of C entries, we an ensure that repetitive memory requests to the same memory address within a time window C will only result in at most two memory aesses in the worst-ase, with one read request followed by one write request. All the other requests will only be stored in the reservation table to provide a fixed delay. Another key ontribution of this paper is a mathematial one we prove that index randomization ombined with a reasonably sized reservation table an handle with overwhelming probability arbitrary (inluding adversarial) memory request patterns without having overload situations as refleted by long queueing delays (to be made preise in Setion V). This result is a worst-ase large deviation theorem in nature [9] beause it establishes a bound on the largest (worst ase) value among the tail probabilities of having long queueing delays under all admissible (inluding adversarial) memory aess patterns. Our methodology for proving this hallenging mathematial result is a novel ombination of onvex ordering and (traditional) large deviation theory. C. Outline of Paper The rest of the paper is organized as follows. Setion II defines the notion of SAM emulation. Setion III desribes the basi memory arhiteture. Setion IV extends our proposed memory arhiteture providing robustness against adversarial aess patterns. Setion V provides a rigorous analysis on the performane of our arhiteture in the worst-ase. Setion VI presents an evaluation of our proposed arhiteture. Finally, Setion VII onludes the paper. II. IDEAL SAM EMULATION In this paper, we aim to design a DAM-based memory arhiteture that an emulate a fast SAM by exploiting memory interleaving. Suppose that the SAM-to-DAM random aess lateny ratio is μ (e.g. μ = 4ns/40ns = 1/10, where the aess latenies of SAM and DAM are assumed to be 4 ns and 40 ns respetively). e use B>1/μ DAM banks and randomly distribute the memory requests aross these DAM banks so that when the loads of these memory banks are perfetly balaned, the load fator of any DAM 1 bank is Bμ < 1. For simpliity, we assume that an ideal SAM an omplete a read or write operation in the same yle that the operation is issued. On the other hand, it takes a DAM bank 1/μ yles to finish a read or write operation. A SAM emulation that mimis the behavior of an ideal SAM is defined as follows Definition 1 (Emulation) A memory system is said to emulate an ideal SAM if under the same input sequene of reads and writes, it produes exatly the same output sequenes of read results, exept time-shifted by some fixed delay Δ. More speifially, our emulation guarantees the following semantis Fixed pipeline delay If a read operation is issued at time t to an emulated SAM, the data is available from the

3 3 memory ontroller at exatly time h = t +Δ (instead of the same yle), where h is the ompletion time. Cohereny The read operations output the same results as an ideal SAM system, exept for a fixed time-shift. Fig. 1 illustrates the onept of SAM emulation. In Fig. 1, a series of six read and write aesses to the same memory loation are initiated at times 0, 1, 2,..., 5 respetively. If the memory is SAM, then the read aesses at times 0, 4, 5 should return values a,, respetively. ith our SAM emulation, exatly the same values a,, will be returned, albeit at times Δ, 4+Δ, 5+Δ respetively. input operations random address permutation request buffers DAM banks reservation table B data out time time op addr data b 2 op addr data b Fig. 1. a 0 a 0 Ideal SAM time SAM Emulation time data out 5 4 data out SAM Emulation 3 2 a Δ+5 Δ+4 Δ+3 Δ+2 Δ+1 Note the definition of emulation does not require a speifi ompletion time for a write operation beause nothing is returned from the memory system to the issuing proessor. As to the read operations, the emulation definition only requires the output sequene (i.e. sequene of read results) to be the same, exept time-shifted by a fixed Δ yles. The definition does not require the snapshot of the memory ontents to be the same. Therefore, the ontents in the DAM banks do not neessarily have to be the same as in an ideal SAM bank at all times. For example, as we shall see later in our extended memory arhiteture, with the two bak-tobak write operations in Fig. 1, only the data of the seond write operation is required to update the memory to provide ohereny, whereas all write operations orrespond to atual memory updates in an ideal SAM. III. THE BASIC MEMOY ACHITECTUE The basi memory arhiteture is shown in Fig. 2. It onsists of a reservation table, a set of DAM banks with a orresponding set of request buffers, and a random address permutation funtion. A. Arhiteture eservation Table The reservation table with Δ entries is implemented in SAM to provide for a fixed delay of Δ for all inoming operations. For eah operation arriving at time t, an entry (a row in Fig. 2) is reated in the reservation table at loation (t +Δ) modδ. Eah reservation table entry onsists of three parts a 1-bit field to speify the operation (read or write), the memory 1 a 0 Δ Fig. 2. Basi Memory Arhiteture address, and the data field. The data field stores the data to be written to or to be retrieved from the memory. DAM Banks and equest Buffers There are B>1/μ DAM banks in the system to math the SAM throughput. Also, there are B request buffers, one for eah DAM bank. Memory operations to the same DAM bank are queued at the same request buffer. Eah request buffer entry is just a pointer to the orresponding reservation table entry, whih ontains the information about the memory operation. Given the random permutation of memory addresses, we an statistially size the request buffers to ensure an extremely low probability of overflow. e defer to Setion V to disuss about this analysis. Let K be the size of a request buffer. Then the B request buffers an be implemented using multiple memory hannels. In eah hannel the request buffers are servied in a round-robin order and different hannels are servied onurrently. For eah hannel there is a dediated link to the reservation table. For example, with μ = 1/16 and B = 32 the request buffers an be implemented on two hannels of 16 banks on eah hannel. Therefore, eah request buffer takes 1/μ yles to be servied. A memory operation queued at a request buffer would take at most Δ=K/μ yles to omplete. e set the fixed pipeline delay in yles for the external memory interfae to this Δ. andom Address Permutation Funtion The goal of the random address permutation funtion is to randomly distribute memory loations so that memory operations to different memory loations are uniformly spread over B DAM banks with equal probability 1/B. Unless otherwise noted, when referring to a memory address, we will be referring to the address after random permutation. Note that if the inoming operations aess the same memory loation, then they will still generate entries to the same request buffer. B. Operations For a read operation issued at time t, its ompletion time is h = t +Δ. A reservation table entry is reated at loation h mod Δ. The data field is initially pending. A DAM read

4 4 operation gets inserted into the orresponding request buffer. hen a read operation at the head of a request buffer is servied, whih may be earlier than its ompletion time h, the orresponding data field of its reservation table entry gets updated. In this way, the reservation table effetively serves as a reorder buffer. At the ompletion time h of the read operation, data from orresponding reservation table entry gets opied to the output. The reservation table entry is removed after Δ yles. For a write operation issued at time t, a reservation table entry is reated at loation h mod Δ, where h = t+δ.also, a DAM write operation is inserted into the orresponding request buffer. hen the write operation at the head of a request buffer is servied, whih may be earlier than its ompletion time h, the write data is updated to the DAM address. Its reservation table entry is removed Δ yles after its arrival time t. By sizing the reservation table to have Δ entries, the lifetime of a read or write reservation entry is guaranteed to be longer than the time it takes for the DAM read or write to our respetively. C. Adversarial Aess Patterns Even though a random address permutation is applied, the memory loads to the DAM banks may not be balaned due to some adversarial aess patterns as follows. First, many appliations require the lookup of global variables. epeated lookups to a global variable will trigger repeated operations to the same DAM bank loation regardless of the random address permutation implemented. Seond, although attakers annot know how memory addresses are mapped to DAM banks, they an still trigger repeated operations to the same DAM bank by issuing memory operations to the same memory loations. Due to these adversarial aess patterns, the number of pending operations in a request buffer may grow indefinitely. To mitigate these situations, our extended memory arhiteture in Setion IV effetively utilizes the reservation table in SAM as a ahe to eliminate unneessary DAM operations queued in the request buffers. IV. THE EXTENDED MEMOY ACHITECTUE Fig. 3 depits our proposed extended memory arhiteture. As with the basi arhiteture, there is a reservation table, a set of DAM banks, and a orresponding set of request buffers. For eah memory operation, its ompletion time is still exatly Δ yles away from the perspetive of the issuing proessor. However, in ontrast to the basi memory arhiteture, we do not neessarily generate a new DAM operation to the orresponding request buffer for every inoming memory operation. In partiular, we an avoid generating new DAM operations in many ases by using the reservation table effetively as a data ahe. e will desribe in more details in our operation merging rules later in this setion. At the high-level, our goal is to merge operations that are issued to the same memory loation within a window of C yles. This is ahieved by extending the basi arhiteture input operations random address permutation Fig. 3. request buffers MI table (CAM) reservation table C DAM banks -link -link -link -link M table (CAM) Extended Memory Arhiteture in the following ways. First, the size of the reservation table an be set to any C Δ entries to ath mergeable operations that are issued at most C yles apart. Seond, eah reservation table entry is expanded to ontain the following information Pending Status p A memory read operation is said to be pending with p =1if there is a orresponding entry in the request buffer, or if it is linked to an operation that is still pending. Otherwise, the read operation is nonpending with p =0. The memory write operations in the reservation table are set as pending with p =1. -link Pending read operations to the same memory address are linked together into a linked list using the -link field, with the earliest/latest read operations at the head/tail of the list respetively. In addition to the additional fields in the reservation table, two lookup tables are added to the extended arhiteture a Most eently Issued (MI) lookup table and a Most eent rite (M) lookup table. Both of these tables are implemented using Content-Addressable-Memories (CAM) to enable diret lookup. The MI table keeps trak of the most reently issued operation (either read or write) to a memory address. hen a new read operation arrives, an MI lookup is performed to find the most reent operation in the reservation table. The M table keeps trak of the most reent write operation to a memory address. hen a write operation in the reservation table is removed, an M lookup is performed to hek if there is another more reent write operation to the same memory address. For an MI lookup, if there is a mathed entry, it returns a pointer to the row in the reservation table that ontains the most reent operation to the same memory address. Similarly, an M lookup returns a pointer to the row in the reservation table orresponding to the most reent write operation for a given memory address. In the extended arhiteture, eah entry in the request buffers needs a data field for write operations. For read operations in the request buffers, a request buffer entry serves as a pointer to the orresponding reservation table entry. But for write operations in the request buffers, a request buffer p p p p B C C data out

5 5 entry stores the atual data to be written to a DAM bank. A. eservation Table Management A reservation table entry gets freed when the operation in the entry stays in the reservation table for C yles. For an operation arrived at time t, its reservation table entry will be freed at time g = t + C. To ahieve this, we maintain two pointers pointer h as a ompletion time pointer, and pointer g as a garbage olletion time pointer. hen the urrent time is g, then the orresponding reservation table entry is freed (meaning the entry is leared). On a MI (or M) lookup, if it returns a reservation table entry with different address (addr), then we also remove this MI (or M) entry. B. Memory Operations hen a read operation () arrives, a new entry in the reservation table is reated for. Then we have the following three ases Case 1 If the MI lookup fails, whih means there is no previous operation to the same memory address in the reservation table, we then generate a new read operation to the orresponding request buffer. A new MI entry is reated for this operation also, and its pending status p is set to 1. hen the atual DAM read operation finishes, the data field of in the reservation table entry is updated, and p is reset to 0. Case 2 The most reent operation to the same memory address returned by the MI lookup is a pending read operation. In this ase, we follow these steps 1) e reate a -link (shown as the dashed line in Fig. 4) from this most reent read operation to and set its pending status p to 1. e do not reate a new read operation in the request buffers. 2) The MI entry is updated with the loation of in the reservation table. Essentially, a linked list of read operations to the same address is formed, with head/tail orresponding to the earliest/latest read, respetively. At the ompletion time of a read operation, we opy the read data to the next read operation by following its -link, and we reset p to 0. Therefore, only the first read operation in the linked list generates an atual read operation in the request buffer. The remaining read operations simply opy the data from the earlier read operation in the linked list order. An example of the management of -links for read operations is shown in Fig. 4. pending Fig. 4. -Link most reent request -Link -link for read operation new Case 3 The most reent operation to the same address returned by the MI lookup is a write operation or a non-pending read operation. In this ase, we opy the data from this most reent write or non-pending read operation to the new loation. In this way, is guaranteed to return the most reent write or non-pending read data. The MI entry is updated by pointing to this new operation. hen a read operation reahes its fixed delay Δ and departs from the system, its data is sent to the external data out. The orresponding reservation table entry is removed after C yles. Also, if there is an entry in MI that points to the reservation table entry, then this MI entry is removed also. hen a new write operation () arrives, a new entry in the reservation table is reated for. Also, we have the following three ases Case 1 If the MI lookup fails, we reate a new write operation into the orresponding request buffer, and we reate a new M and MI entry for this new operation. Case 2 If the MI lookup returns an entry in the reservation table, then we reate an entry in the reservation table for. Also, an M lookup is performed. If the M lookup returns an entry in the reservation table, then the orresponding entries in the MI and M are updated by pointing to the new operation in the reservation table. Otherwise, if the M lookup does not find an entry, then the orresponding entry in MI is updated to and a new entry is reated in M for. A write operation is removed from the reservation table after C yles. An M lookup is performed to hek if there is a more reent write operation in the reservation table. If there is suh a write operation (i.e. the M lookup returns a different memory address), then no request buffer is reated for. Otherwise, there is no other write operation in the reservation table, and the M lookup returns the address of operation. Then a new entry in the request buffer is generated for operation to update the orresponding DAM bank loation. Also, we delete the entry in M pointing to the operation. C. Operation Merging ules Based on the desriptions of the read and write operations above, effetively we are performing the following merging rules to avoid introduing unneessary DAM operations. The operations arrive in the order from right to left on the left-hand-side of the arrows. The atual memory operation(s) generated in the request buffers are shown on the right-handside of the arrows. 1) The operation opies data diretly from the operation stored in the reservation table, thus it is not inserted into the request buffers. 2) The earlier (right) operation does not generate new entry in the request buffers. 3) The latter (left) operation is linked to the earlier operation by its -link. No entry is reated in the request buffer for the latter operation.

6 6 4) Both the operation and the operation have to aess the DAM banks. They an not be merged. Entries in the request buffer needs to be reated for the and operations. For the last rule,, even though the operations annot be merged, the latter inoming operation to the same memory address an be merged. Consider the following two ases (input sequene from right to left) () () The last two () merged to () using the rule. () () The last two () merged to () using the rule. ith the above merging rules, data ohereny is maintained. Sine the reservation table has already provided fixed delay Δ for all the read operations, to show data ohereny, we just need to prove that all the read operations will output the orret data. e will prove this by showing in the following that the relative ordering of the read and write operations are preserved in our arhiteture, whih means that the read operations output the same data as in an SAM system. In partiular, we will fous on a write operation and show that operation merging rules will not affet the read operations before or after the write operation. Let s onsider the following ases 1) A newly arrived write operation will not affet the data retrieved by the read operations before it, sine the write operation will not be inserted into the request buffer until C yles later, by whih time all the read operations before have already finished. 2) For read operations arriving after a write operation in the reservation table, with no other writes in between, they will read the orret data diretly from. 3) For read operations arriving after a write operation in the reservation table, with other writes in between, they will read the orret data from the most reent write operation. 4) A write operation is removed from the reservation table C yles after it arrives. Upon removal, if there is another most reent write operation in the reservation table, the newly arrived read operations will read the orret data from. Therefore, the removal of will not affet the data of the future read operations. 5) Upon the removal of a write operation in the reservation table, if there is no other more reent write operation, but there is a most reent read operation, then an entry is generated in the request buffer for to update the data in the orresponding DAM bank. All future inoming read operations will read the orret data from diretly or from the DAM bank. Sine is already in the request buffer, future inoming read operations will generate entries in the request buffer only after, and thus they will read the orret data from the memory banks. 6) Upon the removal of a write operation in the reservation table if there is no other operations aessing the same DAM loation in the reservation table, then an entry is generated in the request buffer for to update the memory banks. All the future read operations will only generate entry in the request buffer after, thus they will be able to retrieve the orret data. In summary, the read operations always return the orret data with a fixed delay C, and therefore the system is data oherent. Further, using the proposed merging rules, we an ensure the following results There an be only one write operation in the request buffer every C yles to a partiular memory address. A write operation is generated in the request buffer only when there is a write operation in the reservation table for C yles and there is no more reent write operation in the reservation table during this period of time. So a write operation is generated in the request buffer at most one every C yles. There an be at most one read operation in a request buffer every C yles to a partiular address. hen there are more than one arriving read operations to the same address within C yles, we are guaranteed that all exept the first read are merged using -link. There an be at most one read operation followed by one write operation in a request buffer every C yles to a partiular address. If there is a read operation following a write operation, then the read operation an get data diretly from the write operation. Therefore, no new entry will be generated in the request buffer for the read operation. V. ANALYSIS In this setion, we prove the main theoretial result of this paper, whih bounds the probability that any of the request buffers will overflow for all (inluding any adversarial) sequenes of read/write operations. As explained earlier, this worst-ase large deviation result is proved using a novel ombination of onvex ordering and (traditional) large deviation theory. The main idea of our proof is as follows. Given any sequene of read/write operations (to the DAM banks) over a time period [s, t] (viewed as a parameter setting), we are able to obtain a tight stohasti bound of the number of arrivals of read/write operations to the request buffer of a DAM bank during [s, t] using various tail bound tehniques. Sine our sheme has to work with all possible sequenes, our bound learly has to be the worst ase (i.e. the maximum) stohasti bound over all of them. However, the spae of all suh sequenes is so large that enumeration over all of them is omputationally prohibitive and low omplexity optimization proedures in finding the worst ase does not seem to exist. Fortunately, we disover that the aforementioned number of arrivals under all these sequenes are dominated by that under a partiular (i.e., worst-ase) sequene, in the onvex order (not in the stohasti order). Sine e θx is a onvex funtion, we are able to upper-bound the moment generating funtions (MGF) of the number of arrivals under all other sequenes

7 7 by that under the worst-ase sequene. However even this worst-ase MGF is prohibitively expensive to ompute. e solve this problem through upper-bounding this MGF by a omputationally friendly formula, then applying Chernoff tehnique to it. The rest of this setion is organized as follows. In Setion V-A, we desribe the overall struture of the tail bound problem, whih shows that the overall overflow event D over time period [0,n] is the union of a set of the overflow events D s,t, 0 s<t n, whih leads to a union bound. In Setion V-B, we show how to bound the probability of eah individual event D s,t using the aforementioned tehnique of ombining onvex ordering with large deviation. A. Union Bound The First Step In this setion we bound the probability of overflowing request buffer Q of a partiular DAM bank. Let D0,n be the event that one or more operations are dropped beause Q is full during time interval [0,n] (in units of yles). This bound will be established as a funtion of system parameters K, B, μ, and C. eall that K is the size of the request buffer, B is the number of DAM banks, μ is the SAM-to-DAM random aess lateny ratio, C is the size of the ahe. In the following, we shall fix n and will therefore shorten D 0,n to D. Note that Pr[ D] is the overflow probability for just one out of B suh request buffers. The overall overflow probability an be bounded by B Pr[ D] (union bound). e first show that Pr[ D] is bounded by the summation of probabilities Pr[D s,t ], 0 s t n, that is, Pr[ D] Pr[D s,t ]. (1) 0 s t n Here D s,t, 0 s<t n, represents the event that the number of arrivals during the time interval [s, t] is larger than the maximum possible number of departures in the queue, by more than the queue size K. Formally letting X s,t denote the number of read/write operations (to the DAM bank) generated during time interval [s, t], then we have D s,t {ω ΩX s,t μ(t s) >K}. Here we will say a few words about the impliit probability spae Ω, whih is the set of all permutations on {1,..., N}, where N is the number of distint memory addresses. Sine we are onsidering the worst ase bound, we assume the maximum number of read/write operations that an be generated to request buffers during time interval [s, t]. Letτ = t s, and let the maximum number be τ. hen τ C, sine eah request an result in at most one read and one write bak, we have τ =2τ. hen τ > C, there an be at most C write baks that annot be aounted for by one of the writes among the τ requests, so τ = τ + C. Combining both we get τ = τ + min(τ,c) (2) e assume that the operations to the request buffers are generated following arbitrary pattern, with the only restrition that read requests to the same address an not repeat within C yles, and write requests to the same address an not repeat within C yles. This is due to the smoothing effet of the reservation table, i.e. repetitions within C yles would be absorbed by the reservation table. Given an arbitrary sequene of operations satisfying the above restrition, then eah instane ω Ω gives us an arrival sequene to the DAM request buffers. The inequality (1) is a diret onsequene (through the union bound) of the following lemma, whih states that if the event D happens, at least one of the events {Ds,t } 0 s<t n must happen. Lemma 1 D = 0 s t n D s,t e omit its proof here as it is straightforward from elementary queueing theory and is idential to that of [10, Lemma 1]. B. Bounding Individual Pr[D s,t ] In this subsetion we find the worst-ase read/write operation sequene for deriving tail bounds for individual Pr[D s,t ] terms. The probability Pr[D s,t ] is learly a (random) funtion of the sequene of read/write operations (viewed as parameters) during the interval [s, t]. As mentioned before, it is not possible to enumerate over all possible parameter settings (i.e., sequenes) to find the worst-ase Pr[D s,t ] bound. Fortunately, onvex ordering omes to our resue by allowing us to analytially bound the MGF of X s,t under all parameter settings by that under a worst-ase setting. For simpliity, in this setion we will drop the subsripts of X s,t and use X instead. 1) Mathematial Preliminaries In the following, we first desribe the standard Chernoff tehnique for obtaining sharp tail bounds from the MGF of a random variable (in this ase X) 1. Pr[D s,t ] = Pr[X>K+ μτ] =Pr[e Xθ >e (K+μτ)θ ] E[eXθ ] e. (K+μτ)θ where θ>0is any onstant, and the last step is due to Markov inequality. Here τ is defined as t s. Sine this is true for all θ, wehave Pr[D s,t ] min θ>0 E[e Xθ ]. (3) e (K+μτ)θ Then, we aim to bound the moment generating funtion E[e Xθ ] by finding the worst-ase sequene. Note that we resort to onvex ordering, beause stohasti order, whih is the onventional tehnique to establish ordering between random variables and is stronger than onvex order, does not hold here, as we will show shortly. Sine onvex ordering tehniques are needed to establish the bound, we present the definition of onvex funtion and onvex ordering here Definition 2 (Convex funtion) A real funtion f is alled onvex, iff(αx +(1 α)y) αf(x)+(1 α)f(y) for all x and y and all 0 <α<1. 1 This tehnique was apparently first used by Bernstein.

8 8 Definition 3 (Convex order [11, 1.5.1]) Let X and Y be random variables with finite means. Then we say that X is less than Y in onvex order (written X x Y ), if E[f(X)] E[f(Y )] holds for all real onvex funtions f suh that the expetations exist. 2) orst-case Parameter Setting In this setion, we speify the worst-ase parameter setting (in the sense of onvex ordering) and prove it is indeed the worst-ase. Let m i, 1 i N be the total number of read and write operations generated to the request buffers for the i th address during time interval [s, t]. So N i=1 m i = τ, where τ is defined in (2). e have X = N i=1 m ix i, where X i is the indiator random variable for whether the i th address is mapped to the DAM bank. e have E[X i ]= 1 B.Butthe X i s are not independent sine we are doing permutation on the addresses. As explained earlier, among operations generated to request buffers, read requests to the same address an not repeat within C yles, and write requests to the same address an not repeat within C yles. Therefore none of the ounts m 1,..., m N an exeed 2T, where T = τ C. One an ahieve m i = 2T by issuing pairs of a read operation followed by a write operation for the i th address every C yles. 2 Moreover, let q 1 = τ (T 1)C, then at most q 1 addresses ould have ount 2T. e all any vetor m = {m 1,..., m N } a valid splitting pattern of τ if the following are satisfied 0 m i 2T, N i=1 m i = τ, {i m i =2T } q 1.LetMbe the set of all valid splitting patterns. 3 Let X m = N i=1 m ix i. Let q 2 = (τ 2Tq 1 )/(2T 1), r = τ 2Tq 1 (2T 1)q 2. Let m be suh a splitting pattern m 1 =... = m q1 =2T, m q1+1 =... = m q1+q 2 =2T 1, m q1+q 2+1 = r, and the rest of m i are 0. e omit the proof of the following theorem sine it is similar to that of [10, Theorem 2]. Theorem 1 m is the worst ase splitting pattern in terms of onvex ordering, i.e. X m x X m, m M. emark Note that stohasti order does not hold here, sine E[X m ]=E[X m ]=τ /B. For stohasti order to hold between two random variables of different distributions, their expetations must differ [11, Theorem 1.2.9]. Unfortunately, it is in general not possible to apply the Chernoff bound diretly to the MGF of X m,asx m is the sum of dependent random variables and is very expensive to ompute. Our solution is to find a way to upper-bound E[e X m θ ] by a more omputationally friendly formula. For this purpose we use a lemma by Hoeffding [12, Theorem 4], whih bounds the outome of sampling without replaement by that of sampling with replaement in the onvex order. Then we apply the Chernoff tehnique to obtain the following bound. e omit the proof here sine it is similar to those of [10, Theorem 3] and [10, Theorem 4]. 2 Stritly speaking it is every C +1yles. 3 Not all valid splitting pattern may have a plausible read/write sequene mathing it, but this does not affet out bound. Theorem 2 ( 1 B For τ C, Pr[D s,t ] min e2θ +(1 1 B ))τ ; θ>0 e (K+μτ)θ For τ>c, e (q1e2tθ +q 2e (2T 1)θ +e rθ q 1 q 2 1)/B Pr[D s,t ] min. θ>0 e (K+μτ)θ e an see that the bound is translation invariant, i.e. it only depends on τ = t s. Therefore, the omputation ost of (1) is O(n) instead of O(n 2 ), where n is the length of the total time interval. In onlusion, we have established the bound for the overflow probability under any read or write sequenes. It an be omputed though O(n) number of numerial minimizations for one-dimensional funtions expressed in Theorem 2. VI. EVALUATION In this setion, we present evaluation results for our proposed extended memory arhiteture desribed in Setion IV. In partiular, we used parameters derived from two realworld Internet traffi traes for our evaluations. The traes that we used were olleted at different loations in the Internet, namely University of Southern California (USC) and University of North Carolina (UNC), respetively. The trae from USC was olleted at their Los Nettos traing faility on February 2, 2004, and the trae from UNC was olleted on a 1 Gbps aess link onneting the ampus to the rest of the Internet on April 24, The trae from USC has million pakets and around 8.6 million flows, and the trae segment from UNC has million pakets and around 13.5 million flows. To support suffiient data storage for both traes, we set the number of addresses in the DAM banks to be N =16million. Overflow Probability Bound C=6000 C=7000 C=8000 C= Queue Length K Fig. 5. Overflow probability bound as a funtion of request buffer size K with µ =1/10 and B =32. In Fig. 5, the overflow probability bounds with different reservation table sizes C as a funtion of request buffer sizes K are presented, where μ = 1/10 and B = 32. As K inreases, the overflow probability bound dereases. ith

9 9 C 8000 we an ahieve an overflow probability bound of starting from a request buffer of size K = 180. Overflow Probability Bound B=32 B=34 B=36 B= equest Buffer Size K Fig. 6. Overflow probability bound as a funtion of number of memory banks B with µ =1/10 and C = In Fig. 6, the system overflow probability bounds with different numbers of memory banks B as a funtion of queue length K are presented, where μ =1/10 and C = It an be seen from this figure that given the same K as B inreases, the overflow probability bound dereases. Now let s onsider the size of the reservation table. For eah entry in a reservation table, one bit is for op to distinguish read and write operations. ith N =16millions entries in the DAM banks, addr of size log 2 N =24bits is suffiient to address every memory loation. The size of -link is log 2 C =13bits, with C = Moreover the size of the pending status p is 1 bit. Let the data size be 8 bytes or 64 bits. Altogether the total size of eah entry in the reservation table is 103 bits. For a reservation table with C = 8000 entries, its total size is about 101 KB, whih an be easily implemented in SAM. For the MI and M tables, only pointers are stored to enable fast searhing on the reservation table entries. Eah entry in the MI or M table is of size log 2 N =24bits, where N is the number of addresses in the DAM banks. There an be at most C entries in the MI or M, where C is the size of the reservation table. ith C = 8000, the total size of MI or M is about 24 KB, whih an be easily implement in CAMs. In the request buffers, eah entry is a pointer to an entry in the reservation table plus a data field for write operation. An entry in the request buffers is of size log 2 C.ForC = 8000, the size of the pointer in the request buffer is 13 bits. Let the size of the data field be 8 bytes. Let B =32and K = 180 to provide with overflow probability, the total size of the request buffers is only about 55 KB. It is worth noting that our evaluations are based on the assumption of worst ase senarios where the requests to the same memory loations are repeated every C yles. For real-world traffi the assumption above is far too pessimisti. e expet that muh smaller request buffers (K) and muh smaller reservation table size (C) will be suffiient for most real-world Internet traffi, whih will result in muh smaller delay Δ, where Δ=K/μ. VII. CONCLUSION e proposed a memory arhiteture for high-end Internet routers that an effetively maintain wirespeed read/write operations by exploiting advaned arhiteture features that are readily available in modern ommodity DAM arhitetures. In partiular, we presented an extended memory arhiteture that an harness the performane of modern ommodity DAM offerings by interleaving memory operations to multiple memory banks. In ontrast to prior interleaved memory solutions, our design is robust to adversarial memory aess patterns, suh as repetitive read/write operations to the same memory loation, by using only a small amount of SAM and CAM. e presented a rigorous theoretial analysis on the performane of our proposed arhiteture in the worstase using a novel ombination of onvex ordering and large deviation theory. Our arhiteture supports arbitrary read and write patterns at wirespeed of 40 Gb/s or beyond. Aknowledgement This work is supported in part by ollaborative NSF grants CNS and CNS , funded under the Amerian eovery and einvestment At of 2009 (Publi Law 111-5), and NSF grant CNS EFEENCES [1] S. Iyer and N. Mkeown, Designing buffers for router line ards, Stanford University, Teh. ep. T02-HPNG , Mar [2] J. Gara, J. Corbal, L. Cerd, and M. Valero, Design and implementation of high-performane memory systems for future paket buffers, in International Symposium on Miroarhiteture (MICO), [3] G. Shrimali and N. MKeown, Building paket buffers using interleaved memories, in orkshop on High Performane Swithing and outing (HPS), May [4] S. Kumar, P. Crowley, and J. Turner, Design of randomized multihannel paket storage for high performane routers, in Symposium on High Performane Interonnets (HOTI), [5] A. K. Parekh and. G. Gallager, A generalized proessor sharing approah to flow ontrol in integrated servies networks the singlenode ase, IEEE/ACM Trans. Networking, vol. 1, no. 3, pp , [6] B.. au, Pseudo-randomly interleaved memory, in Pro. 18th Annual International Symposium on Computer Arhiteture, [7]. Lin, S. K. einhardt, and D. Burger, eduing DAM latenies with an integrated memory hierarhy design, in Pro. of IEEE HPCA, ashington, DC, USA, 2001, p [8] B. Agrawal and T. Sherwood, Virtually pipelined network memory, in Pro. 39th Annual IEEE/ACM International Symposium on Miroarhiteture (MICO). ashington, DC, USA IEEE Computer Soiety, 2006, pp [9] C. Pandit and S. Meyn, orst-ase large-deviation asymptotis with appliation to queueing and information theory, Stohasti Proesses and their Appliations, vol. 116, no. 5, pp , [10] H. Zhao, H. ang, B. Lin, and J. Xu, Design and performane analysis of a dram-based statistis ounter array arhiteture, in ACM/IEEE Symposium on Arhitetures for Networking and Communiations Systems (ANCS), [11] A. Muller and D. Stoyan, Comparison Methods for Stohasti Models and isks. iley, [12]. Hoeffding, Probability inequalities for sums of bounded random variables, Journal of the Amerian Statistial Assoiation, vol. 58, no. 301, pp , 1963.

Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture

Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture Chuck Zhao 1 Hao Wang 2 Bill Lin 2 Jim Xu 1 1 Georgia Institute of Technology 2 University of California, San Diego

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture

Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture Chuck Zhao 1 Hao Wang 2 Bill Lin 2 1 1 Georgia Tech 2 UCSD October 2nd, 2008 Broader High-Level Question What are the

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0. C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion

More information

Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture

Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture Haiquan (Chuck) Zhao Hao Wang ill Lin Jun (Jim) Xu College of Computing Georgia Institute of Technology Department

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

The Happy Ending Problem

The Happy Ending Problem The Happy Ending Problem Neeldhara Misra STATUTORY WARNING This doument is a draft version 1 Introdution The Happy Ending problem first manifested itself on a typial wintery evening in 1933 These evenings

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Lateny Choose Two Debajyoti Das Purdue University, USA das48@purdue.edu Sebastian Meiser University College London, U s.meiser@ul.a.uk Esfandiar

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming On Dynami Server Provisioning in Multi-hannel P2P Live Streaming Chuan Wu Baohun Li Shuqiao Zhao Department of Computer Siene Department of Eletrial Multimedia Development Group The University of Hong

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

A Novel Timestamp Ordering Approach for Co-existing Traditional and Cooperative Transaction Processing

A Novel Timestamp Ordering Approach for Co-existing Traditional and Cooperative Transaction Processing A Novel Timestamp Ordering Approah for Co-existing Traditional and Cooperative Transation Proessing Author Sun, Chengzheng, Zhang, Y., Kambayashi, Y., Yang, Y. Published 1998 Conferene Title Proeedings

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Test Case Generation from UML State Machines

Test Case Generation from UML State Machines Test Case Generation from UML State Mahines Dirk Seifert To ite this version: Dirk Seifert. Test Case Generation from UML State Mahines. [Researh Report] 2008. HAL Id: inria-00268864

More information

Verification of Parameterized Concurrent Programs By Modular Reasoning about Data and Control

Verification of Parameterized Concurrent Programs By Modular Reasoning about Data and Control Verifiation of Parameterized Conurrent Programs By Modular Reasoning about Data and Control Azadeh Farzan Zahary Kinaid University of Toronto azadeh,zkinaid@s.toronto.edu Abstrat In this paper, we onsider

More information

Sequential Incremental-Value Auctions

Sequential Incremental-Value Auctions Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment hemial, Biologial and Radiologial Haard Assessment: A New Model of a Plume in a omplex Urban Environment Skvortsov, A.T., P.D. Dawson, M.D. Roberts and R.M. Gailis HPP Division, Defene Siene and Tehnology

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

Real-time Container Transport Planning with Decision Trees based on Offline Obtained Optimal Solutions

Real-time Container Transport Planning with Decision Trees based on Offline Obtained Optimal Solutions Real-time Container Transport Planning with Deision Trees based on Offline Obtained Optimal Solutions Bart van Riessen vanriessen@ese.eur.nl Eonometri Institute Erasmus Shool of Eonomis Erasmus University

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with

More information

IN structured P2P overlay networks, each node and file key

IN structured P2P overlay networks, each node and file key 242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 2, FEBRUARY 2010 Elasti Routing Table with Provable Performane for Congestion Control in DHT Networks Haiying Shen, Member, IEEE,

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

Z8530 Programming Guide

Z8530 Programming Guide Z8530 Programming Guide Alan Cox alan@redhat.om Z8530 Programming Guide by Alan Cox Copyright 2000 by Alan Cox This doumentation is free software; you an redistribute it and/or modify it under the terms

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

represent = as a finite deimal" either in base 0 or in base. We an imagine that the omputer first omputes the mathematial = then rounds the result to

represent = as a finite deimal either in base 0 or in base. We an imagine that the omputer first omputes the mathematial = then rounds the result to Sientifi Computing Chapter I Computer Arithmeti Jonathan Goodman Courant Institute of Mathemaial Sienes Last revised January, 00 Introdution One of the many soures of error in sientifi omputing is inexat

More information

High-level synthesis under I/O Timing and Memory constraints

High-level synthesis under I/O Timing and Memory constraints Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information