Pipelined Multipliers for Reconfigurable Hardware

Size: px
Start display at page:

Download "Pipelined Multipliers for Reconfigurable Hardware"

Transcription

1 Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA USA {mmyjak, Abstrat Reonfigurable devies used in digital signal proessing appliations must handle large amounts of data in vetor form. Most signal proessing algorithms use multipliation extensively; thus, the hardware must support this operation to ahieve high performane. However, mapping a multiplier on traditional fine-grain devies produes a omplex struture whose performane is limited by the routing overhead. In this paper, we present a novel pipelined multiplier struture suitable for medium-grain and oarse-grain reonfigurable ell arrays. We first implement an unsigned n-bit multiplier using m-bit ells. Then, we show how the same struture an work with two s-omplement data with small hanges to the onfiguration. The struture requires n/m 2 ells, but an exeute vetor operations in a pipelined fashion. We also disuss the benefits of using a hierarhial design for large multipliers. 1. Introdution Reonfigurable hardware has beome an attrative option for implementing digital signal proessing (DSP), espeially in appliations that require both high performane and flexibility. The performane of reonfigurable devies typially falls between ustom integrated iruits and digital signal proessors, while the flexibility may even surpass both alternatives. In addition, reonfigurable hardware inurs a low development ost and an be adapted if the needs of the appliation hange, even after deployment [1]. DSP algorithms plae great demands on the proessing power of any hardware implementation, due to the large amount of binary arithmeti involved. For example, the basi operation of a finite impulse-response (FIR) filter ontains several multipliations and additions: y[n] = x[n] + x[n 1] + + b k x[n k] (1) As another example, the essential omponent of the Fast Fourier Transform (FFT) also requires these two operations, although the inputs and outputs are omplex numbers in this ase: Y = X + X 1, Y 1 = (X X 1 ) W. (2) Most DSP algorithms repeat basi operations suh as these for every sample in the data set. To ahieve maximum performane, the hardware an pipeline the multipliation and addition operations so that multiple samples an be proessed simultaneously. This tehnique dramatially redues the exeution time of DSP algorithms, but inurs a penalty of additional overhead. Consider the problem of using reonfigurable hardware to perform binary arithmeti on large data sets. In general, reonfigurable devies ontain an array of programmable ells and interonnetion strutures [2]. Traditional fine-grain arhitetures suh as the fieldprogrammable gate array (FPGA) plae little funtionality in the ells. Implementing an adder on a fine-grain devie presents no major problems, as the ells an easily generate the arry and sum bits required for this operation. However, implementing a multiplier is a signifiant hallenge, due to the routing delays assoiated with inter-ell ommuniation in fine-grain devies. One way around this problem is to inlude dediated multipliation hardware in the arhiteture [3, 4]. Another approah is to extend the apabilities of eah ell to work with m-bit data words instead of single bits [5]. In fat, these medium-grain and oarse-grain reonfigurable devies show great promise for DSP appliations [6, 7]. With this approah, the problem then beomes the following: given an array of m-bit ells, design a struture to multiply two unsigned n-bit integers A and B: Y 2n 1: = (A n 1: B n 1: ). (3) Note that the output Y ontains 2n bits. As an initial approah, onsider the familiar arry-save multiplier [8]. Figure 1 illustrates this struture for n=2 and m=4. The

2 multiplier ontains a retangular array of ells with n/m ells in the horizontal diretion and n/m + 1 ells in the vertial diretion. A and B are divided into m-bit portions and broadast aross the olumns and rows of the array. A 15:12 A 11:8 A 7:4 A 3: x x x x x B 3: Y 3: 2. Unsigned Multiplier The most omplex operation performed by any ell in the arry-save multiplier is the m-bit multiply-aumulate (MAC) funtion m 1: = (a m 1: b m 1: ) + m 1: + d m 1:. (4) Here a and b represent the two m-bit portions of A and B, and and d denote the two terms added to the result. Figure 2 illustrates the inputs and outputs of a ell that omputes the MAC operation. a 3: d 3: 3: : : Figure 2. Inputs and outputs of MAC ell (m=4) : Y 35:32 Y 31:38 Y 27:24 Y 23:2 Figure 1. Carry-save multiplier (n=2, m=4) Unlike a typial arry-save multiplier, eah ell works with m-bit inputs instead of 1-bit inputs. Cells on the top row multiply two m-bit portions of A and B, passing the upper and lower portions of result to other ells or the Y output. Cells in the middle rows perform the same multipliation and then add up to two m-bit terms to the result. Finally, ells on the bottom row add up to three m- bit terms together. As a funtion of n and m, the arrysave multiplier requires n/m 2 + n/m ells, while the ritial path is 2 n/m ells long. In the remainder of this paper, we desribe a novel improvement to the arry-save multiplier that redues the total number of ells required. As desribed in Setion 2, we modify the interonnetion struture so that every ell arries the same workload. The resulting struture an be pipelined easily for high throughput. In Setion 3, we demonstrate that the same struture an be used to perform two s-omplement multipliation with slight hanges to the operations performed by eah ell. Setion 4 briefly explores a hierarhial arhiteture in whih eah ell uses a matrix of smaller elements to implement the neessary operations. Finally, Setion 5 gives some onluding remarks. As we proposed in [9], one an redue the size of the multiplier by ensuring that all ells perform the same operation. Suh a redution is possible beause reonfigurable devies typially ontain an array of idential ells. Observe in Figure 1 that the bottom row of ells do not perform multipliation, and the ells in the left olumn add one term instead of the usual two. Hene, we an eliminate the bottom row of ells and rearrange the interonnetion sheme so that the ells in the left olumn take up the slak. Figure 3 depits the resulting struture for the 2-bit ase. This improved design has a size of n/m 2 ells and a ritial path 2 n/m 1 ells long. Notie that two extra n-bit terms C and D an be inorporated into the top row of ells. This enhanement reates a powerful n-bit MAC unit that evaluates the expression Y 2n 1: = (A n 1: B n 1: ) + C n 1: + D n 1:. (5) The primary advantage of using arrays of ells to perform multipliation is that the DSP algorithm an exploit the benefits of pipelining. Suppose that we superpipeline the struture in Figure 3 so that eah ell oupies one pipeline stage. The lok yle time thus inludes the time to evaluate the m-bit MAC funtion as well as the time to transfer the result to adjaent ells. Figure 4 labels eah ell in the improved MAC unit with the lok yle at whih it alulates the intermediate result. We an then insert the appropriate number of pipeline registers into the module, as depited by slashes in the figure.

3 C 19:16 A 15:12 A 11:8 A 7:4 A 3: D 15:12 D 11:8 D 7:4 D 3: C 15:12 C 11:8 C 7:4 C 3: B 3: Y 3: The pipelining sheme in Figure 4 has one disadvantage: the m-bit portions of the B input must be broadast aross several olumns of ells during the same lok yle. Depending on the arhiteture of the reonfigurable devie, suh an operation may not be feasible. One way to eliminate the broadast is to pipeline all the internal lines of the MAC unit. As shown in Figure 5 for the 2-bit ase, this hange inreases the total lateny of the module to 3 n/m 2. This additional delay should be negligible for most DSP algorithms, sine the multiplier still initiates one operation per lok yle. For example, to multiply two 2-bit vetors of 1 elements, the former design requires 18 yles, whereas the latter design requires 112 yles. If the lok yle time an be redued due to the absene of broadast operations, the MAC unit with pipelined internal lines atually ahieves higher performane. Y 35:32 Y 31:38 Y 27:24 Y 23:2 Figure 3. Improved MAC unit (n=2, m=4) C 19:16 A 15:12 A 11:8 A 7:4 A 3: D 15:12 D 11:8 D 7:4 D 3: C 15:12 C 11:8 C 7:4 C 3: C 19:16 A 15:12 A 11:8 A 7:4 A 3: D 15:12 D 11:8 D 7:4 D 3: C 15:12 C 11:8 C 7:4 C 3: B 3: Y 3: B 3: Y 3: Y 35:32 Y 31:38 Y 27:24 Y 23: Figure 5. Superpipelined MAC unit with pipelined internal lines Y 35:32 Y 31:38 Y 27:24 Y 23:2 pipeline lathes Figure 4. Superpipelined MAC unit The lateny of this superpipelined design equals the length of the ritial path, or 2 n/m 1 yles. However, the struture an initiate one operation per lok yle, making the resulting throughput very high. Notie that the MAC unit generates the Y output in a staggered fashion: the least signifiant m bits in the first yle, the next m bits in the seond yle, and so forth. The B input should also arrive in this staggered fashion. 3. Two s-complement Multiplier As a rule, DSP algorithms work with both positive and negative numbers, so it is reasonable to expet that appliations may require two s-omplement multipliation. In fat, the same multiplier struture an be used to perform this operation, exept that some ells evaluate slightly different funtions. Before we disuss these modifiations, reall from (4) that eah ell in the unsigned MAC unit evaluates the m-bit MAC funtion m 1: = (a m 1: b m 1: ) + m 1: + d m 1:. (4)

4 Figure 6 illustrates how these m-bit terms are defined for various ells in the design. For onsisteny, the input to the ell always appears to the left of the d input. 3: a 3: d 3: :4 : : 3: :4 a 3: : d 3: : Figure 6. Cells in improved MAC unit a 3: 3: : d 3: : Now onsider a two s-omplement MAC unit that handles n-bit inputs in m-bit portions. From the properties of two s-omplement numbers, the most signifiant m-bit portion has two s-omplement format, but the remaining m-bit portions have unsigned format. Hene, if we modify the unsigned MAC unit to perform two s-omplement arithmeti, many of the ells will still operate on unsigned inputs. Figure 7 depits the two s-omplement multiplier for n=2 and m=4. Solid lines denote unsigned data; dashed lines denote two s-omplement data. C 19:16 :4 A 15:12 A 11:8 A 7:4 A 3: D 15:12 D 11:8 D 7:4 D 3: C 15:12 C 11:8 C 7:4 C 3: unsigned portion of B. The ell also adds two somplement portions of C and D to the result. In order to represent the entire range of valid outputs, the B ell must generate a 2m-bit output y whose upper m bits and lower m bits are both two s-omplement numbers. This data format is unusual, but is the best hoie for representing the result. One an think of the ell as generating two m-bit outputs satisfying the expression 2 m m 1:m + y m 1: = (a m 1: b m 1: ) + m 1: + d m 1:. (6) where a m 1:, m 1:, d m 1:, m 1:m, and y m 1: are in two somplement format. Table 1 lists several example 4-bit alulations for the B ell. Reall that a 4-bit two somplement numbers ranges from 8 to 7, whereas a 4-bit unsigned number ranges from to 15. Table 1: Example alulations of the B ell a 3: : 3: d 3: :4 : : = 16:4 + : B D C A A A D A C A A D A A C A B 3: Y 3: A similar analysis an be performed for the remaining ells used in the multiplier. For example, the C ells generate an unsigned output m 1:m and a two somplement output y m 1:. With the data formats shown in Figure 7, the n-bit multiplier an generate a two somplement output Y without additional hardware. Table 2 lists the input and output format of eah type of ell (inluding the G ell used later). A + sign denotes unsigned format, and a sign denotes two somplement format. Table 2: Data format requirements for eah ell H F F F E Y 35:32 Y 31:38 Y 27:24 Y 23:2 two s omplement line Figure 7. Two s-omplement MAC unit (m=2, n=4) Observe that some of the ells generate two somplement outputs, whereas other ells do not. In fat, the two s-omplement MAC unit ontains seven types of ells, labeled A through H in the figure (G is missing for tehnial reasons). The A ells simply evaluate the unsigned MAC funtion in (4). However, the B ell must multiply the two s-omplement portion of A with an Type a m 1: b m 1: m 1: d m 1: m 1:m y m 1: A B + C D E F G H +

5 4. Hierarhial Multiplier The last two setions have demonstrated that n-bit MAC units in general require seven types of ells. Eah ell performs the MAC funtion on m-bit inputs, but different ells use different data formats. A natural question is how eah ell an implement the required m- bit operations. For m=1, a simple ombinational iruit suffies, but for larger m, the most pratial solution may involve some kind of arithmeti unit. For reonfigurable devies, onsider the following alternative: to implement the m-bit operations required by eah ell, use an m m array of 1-bit ells. In other words, the proposed arhiteture ontains a two-level hierarhy of ells and elements, where ells work with m-bit words and elements work with single bits. The next question is how the m m array of elements an implement all the funtionality required by m-bit ells. For type A ells, the solution is simple: use the unsigned multiplier struture presented in Setion 2. As shown in Figure 8 for m=4, eah of the elements works with data in unsigned form. Hene, one an lassify the elements as type A as well. where MAJ(P, Q, R) = (P Q) (P R) (Q R) XOR(P, Q, R) = P Q R. (9) As disussed in the last setion, two s-omplement MAC units require additional types of ells. Type B ells, for example, assume that a,, and d have two somplement format, and that b has unsigned format. Using an m m array of elements to implement a type B ell produes the result in Figure 9. 3 a 1 d 1 1 B A A A D C A A D A C A 3 a 1 d 1 1 D A A C Figure 8. Type A ell (m=4) Eah element omputes the 1-bit MAC funtion ψ 1: = (α β) + γ + δ, (7) where α, β, γ, and δ denote the inputs to the element, and ψ signifies the 2-bit output. Note that multipliation redues to the logial AND operation, denoted by, in the 1-bit ase. Eah bit of the output ψ an be expressed in terms of the ombinational logi funtions Figure 9. Type B ell (m=4) Knowing the data format for eah input to the ell, one an determine the format of every internal line using the information in Table 2. The proedure losely parallels the analysis for the two s-omplement multiplier in Figure 7, exept that the signal names are Greek symbols instead of lowerase letters. The implementation of the type B ell requires elements of types A, B, and C. Note that both the upper and lower portions of the y output have two s-omplement format, as shown in Figure 7. Continuing on, ells of types C and D have straightforward implementations (Figures 1-11). Type E ells require five types of elements, inluding type G (Figure 12). Type F ells are similar (Figure 13). Finally, type H ells have the same formatting assignments as the two s-omplement multiplier (Figure 14). This property holds beause all the inputs and outputs of a type H ell have two s-omplement format. ψ 1 = MAJ(α β, γ, δ) ψ = XOR(α β, γ, δ), (8)

6 3 a 1 d a 1 d 1 1 C A A A C A A A A C A A A C A A A A C A A A C A A A A C F F F E Figure 1. Type C ell (m=4) Figure 13. Type F ell (m=4) 3 a 1 d a 1 d 1 1 B A A A D C A A D A C A H F F E Figure 11. Type D ell (m=4) 3 2 a 2 d 2 1 a 1 d 1 G A A A A C A A A A C A F F F E y 7 Figure 12. Type E ell (m=4) Figure 14. Type H ell (m=4) Now onsider the MAC funtion omputed by type B elements. From Table 2, the α, γ, δ, ψ 1, and ψ signals of type B elements all have two s-omplement format. For eah of these signals, logi denotes and logi 1 denotes 1. Hene, type B elements ompute the expression 2ψ 1 ψ = ( α β) γ δ, (1) whih simplifies to 2ψ 1 + ψ = (α β) + γ + δ. (11) Sine (11) and (7) are equivalent, elements of types A and B implement the same ombinational logi expressions. Performing a similar analysis on the remaining types of ells reveals that only four distint types of elements are required. In fat, eah element implements the same

7 expression for ψ ; the only differene is the expression used to ompute ψ 1. Table 3 lists the funtions orresponding to eah type of element. (Note that denotes the logial omplement.) A reonfigurable arhiteture ould exploit these similarities to implement all neessary operations effiiently. Table 3: Redution of element types Type ψ 1 ψ Same as A MAJ(α β, γ, δ) XOR(α β, γ, δ) A B MAJ(α β, γ, δ) XOR(α β, γ, δ) A C MAJ(α β, γ, δ) XOR(α β, γ, δ) C D MAJ(α β, γ, δ) XOR(α β, γ, δ) C E MAJ(α β, γ, δ) XOR(α β, γ, δ) C F MAJ(α β, γ, δ) XOR(α β, γ, δ) F G MAJ(α β, γ, δ) XOR(α β, γ, δ) F H MAJ(α β, γ, δ) XOR(α β, γ, δ) H 5. Conluding Remarks In this paper, we have presented a novel sheme for performing n-bit multiply-aumulate (MAC) operations using a reonfigurable array of m-bit ells. Eah ell omputes an m-bit MAC funtion with two additive terms. The struture an be superpipelined into m-bit units for extremely high throughput, as required in signal proessing appliations. With suitable hanges to the onfiguration of eah ell, the struture an handle unsigned or two s-omplement inputs. To implement the funtionality required by eah ell, we propose to use an m m matrix of reonfigurable 1-bit elements. Only four types of elements are required to onstrut multipliers of any size. As a final note, we have used the onepts presented in this paper to reate a two-level reonfigurable arhiteture for digital signal proessing appliations [9]. The arhiteture ontains an array of reonfigurable 4-bit ells, eah of whih onsists of a 4 4 matrix of elements. Eah element, in turn, uses a 4-input, 2-bit lookup table to evaluate arithmeti or logi funtions. Cells an onnet to neighboring ells in any diretion. However, the matrix of elements an only assume two strutures, one of whih is the struture of the MAC unit. Having the apability to ompute the MAC operation means that ells an perform the arithmeti funtions neessary for digital signal proessing. 7. Referenes [1] R. Tessier and W. Burleson, Reonfigurable omputing for digital signal proessing: a survey, in Y. Hu (ed.), Programmable digital signal proessors, Marel Dekker In., 21. [2] K. Compton and S. Hauk, Reonfigurable omputing: a survey of systems and software, ACM Computing Surveys, vol. 34, no. 2, Jun 22, pp [3] K. Rajagopalan and P. Sutton, A flexible multipliation unit for an FPGA logi blok, in Pro. 21 IEEE International Symposium on Ciruits and Systems, 21, pp [4] S. Haynes and P. Cheung, Configurable multiplier bloks for embedding in FPGAs, Eletronis Letters, vol. 34, iss. 7, Apr 1998, pp [5] R. Hartenstein, Coarse grain reonfigurable arhitetures, in Pro. 6th Asia South Paifi Design Automation Conferene, Yokohama, Japan, 21, pp [6] J. Smit et al, Low ost and fast turnaround: reonfigurable graph-based exeution units, in Pro. 7th BELSIGN Workshop, Enshede, Netherlands, [7] P. Heysters and G. Smit, Mapping of DSP algorithms on the MONTIUM arhiteture, in Pro. International Parallel and Distributed Proessing Symposium, Apr 23, pp [8] J. Rabaey et al, Digital Integrated Ciruits: A Design Perspetive, 2nd ed., Upper Saddle River, NJ: Pearson Eduation, In., 23, pp [9] M. Myjak and J. Delgado-Frias, A two-level reonfigurable arhiteture for digital signal proessing, in Pro. 23 International Conferene on VLSI, Las Vegas, NV, Jun 23, pp Aknowledgment M. Myjak is supported by the U.S. Department of Homeland Seurity Graduate Fellowship.

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Design of High Speed Mac Unit

Design of High Speed Mac Unit Design of High Speed Ma Unit 1 Harish Babu N, 2 Rajeev Pankaj N 1 PG Student, 2 Assistant professor Shools of Eletronis Engineering, VIT University, Vellore -632014, TamilNadu, India. 1 harishharsha72@gmail.om,

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes Redued-Complexity Column-Layered Deoding and Implementation for LDPC Codes Zhiqiang Cui 1, Zhongfeng Wang 2, Senior Member, IEEE, and Xinmiao Zhang 3 1 Qualomm In., San Diego, CA 92121, USA 2 Broadom Corp.,

More information

High Speed Area Efficient VLSI Architecture for DCT using Proposed CORDIC Algorithm

High Speed Area Efficient VLSI Architecture for DCT using Proposed CORDIC Algorithm International Journal of Innovative Researh in Siene, Engineering and Tehnology Website: www.ijirset.om High Speed Area Effiient VLSI Arhiteture for DCT using Proposed CORDIC Algorithm Deepnarayan Sinha

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Department of Eletrial and Computer Engineering University of Wisonsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 2014-2015 Assignment #2 Date Tuesday, September 25, 2014 Due

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

A two-level reconfigurable architecture for digital signal processing

A two-level reconfigurable architecture for digital signal processing Microelectronic Engineering 84 (2007) 244 252 www.elsevier.com/locate/mee A two-level reconfigurable architecture for digital signal processing M.J. Myjak 1, J.G. Delgado-Frias * School of Electrical Engineering

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

DECODING OF ARRAY LDPC CODES USING ON-THE FLY COMPUTATION Kiran Gunnam, Weihuang Wang, Euncheol Kim, Gwan Choi, Mark Yeary *

DECODING OF ARRAY LDPC CODES USING ON-THE FLY COMPUTATION Kiran Gunnam, Weihuang Wang, Euncheol Kim, Gwan Choi, Mark Yeary * DECODING OF ARRAY LDPC CODES USING ON-THE FLY COMPUTATION Kiran Gunnam, Weihuang Wang, Eunheol Kim, Gwan Choi, Mark Yeary * Dept. of Eletrial Engineering, Texas A&M University, College Station, TX-77840

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

Zippy - A coarse-grained reconfigurable array with support for hardware virtualization

Zippy - A coarse-grained reconfigurable array with support for hardware virtualization Zippy - A oarse-grained reonfigurable array with support for hardware virtualization Christian Plessl Computer Engineering and Networks Lab ETH Zürih, Switzerland plessl@tik.ee.ethz.h Maro Platzner Department

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Folding. Hardware Mapped vs. Time multiplexed. Folding by N (N=folding factor) Node A. Unfolding by J A 1 A J-1. Time multiplexed/microcoded

Folding. Hardware Mapped vs. Time multiplexed. Folding by N (N=folding factor) Node A. Unfolding by J A 1 A J-1. Time multiplexed/microcoded Folding is verse of Unfolding Node A A Folding by N (N=folding fator) Folding A Unfolding by J A A J- Hardware Mapped vs. Time multiplexed l Hardware Mapped vs. Time multiplexed/mirooded FI : y x(n) h

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

High-level synthesis under I/O Timing and Memory constraints

High-level synthesis under I/O Timing and Memory constraints Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

Improved Circuit-to-CNF Transformation for SAT-based ATPG

Improved Circuit-to-CNF Transformation for SAT-based ATPG Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany

More information

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen The Heterogeneous Bulk Synhronous Parallel Model Tiani L. Williams and Rebea J. Parsons Shool of Computer Siene University of Central Florida Orlando, FL 32816-2362 fwilliams,rebeag@s.uf.edu Abstrat. Trends

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment Send Orders for Reprints to reprints@benthamsiene.net 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 21, no. 2, August 2008, 209-220 Comparison of Higher Order FEM and MoM/SIE Approahes in Analyses of Closed- and Open-Region Eletromagneti Problems Milan

More information

The recursive decoupling method for solving tridiagonal linear systems

The recursive decoupling method for solving tridiagonal linear systems Loughborough University Institutional Repository The reursive deoupling method for solving tridiagonal linear systems This item was submitted to Loughborough University's Institutional Repository by the/an

More information

Space- and Time-Efficient BDD Construction via Working Set Control

Space- and Time-Efficient BDD Construction via Working Set Control Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Parallelization and Performance of 3D Ultrasound Imaging Beamforming Algorithms on Modern Clusters

Parallelization and Performance of 3D Ultrasound Imaging Beamforming Algorithms on Modern Clusters Parallelization and Performane of 3D Ultrasound Imaging Beamforming Algorithms on Modern Clusters F. Zhang, A. Bilas, A. Dhanantwari, K.N. Plataniotis, R. Abiprojo, and S. Stergiopoulos Dept. of Eletrial

More information

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Lateny Choose Two Debajyoti Das Purdue University, USA das48@purdue.edu Sebastian Meiser University College London, U s.meiser@ul.a.uk Esfandiar

More information

Parallel Block-Layered Nonbinary QC-LDPC Decoding on GPU

Parallel Block-Layered Nonbinary QC-LDPC Decoding on GPU Parallel Blok-Layered Nonbinary QC-LDPC Deoding on GPU Huyen Thi Pham, Sabooh Ajaz and Hanho Lee Department of Information and Communiation Engineering, Inha University, Inheon, 42-751, Korea Abstrat This

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

On the Generation of Multiplexer Circuits for Pass Transistor Logic

On the Generation of Multiplexer Circuits for Pass Transistor Logic Preprint from Proeedings of DATE 2, Paris, rane, Marh 2 On the Generation of Multiplexer Ciruits for Pass Transistor Logi Christoph Sholl Bernd Beker Institute of Computer Siene Albert Ludwigs University

More information

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

Reading Object Code. A Visible/Z Lesson

Reading Object Code. A Visible/Z Lesson Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly

More information

Reading Object Code. A Visible/Z Lesson

Reading Object Code. A Visible/Z Lesson Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

splitting tehniques that partition live ranges have been proposed to solve both the spilling problem[5][8] and the assignment problem[8][9]. The parti

splitting tehniques that partition live ranges have been proposed to solve both the spilling problem[5][8] and the assignment problem[8][9]. The parti Load/Store Range Analysis for Global Register Alloation Priyadarshan Kolte and Mary Jean Harrold Department of Computer Siene Clemson University Abstrat Live range splitting tehniques divide the live ranges

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Stable Road Lane Model Based on Clothoids

Stable Road Lane Model Based on Clothoids Stable Road Lane Model Based on Clothoids C Gakstatter*, S Thomas**, Dr P Heinemann*, Prof Gudrun Klinker*** *Audi Eletronis Venture GmbH, **Leibniz Universität Hannover, ***Tehnishe Universität Münhen

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Evaluation of Benchmark Performance Estimation for Parallel. Fortran Programs on Massively Parallel SIMD and MIMD. Computers.

Evaluation of Benchmark Performance Estimation for Parallel. Fortran Programs on Massively Parallel SIMD and MIMD. Computers. Evaluation of Benhmark Performane Estimation for Parallel Fortran Programs on Massively Parallel SIMD and MIMD Computers Thomas Fahringer Dept of Software Tehnology and Parallel Systems University of Vienna

More information

Staircase Join: Teach a Relational DBMS to Watch its (Axis) Steps

Staircase Join: Teach a Relational DBMS to Watch its (Axis) Steps Stairase Join: Teah a Relational DBMS to Wath its (Axis) Steps Torsten Grust Maurie van Keulen Jens Teubner University of Konstanz Department of Computer and Information Siene P.O. Box D 88, 78457 Konstanz,

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G. Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland

More information

Alleviating DFT cost using testability driven HLS

Alleviating DFT cost using testability driven HLS Alleviating DFT ost using testability driven HLS M.L.Flottes, R.Pires, B.Rouzeyre Laboratoire d Informatique, de Robotique et de Miroéletronique de Montpellier, U.M. CNRS 5506 6 rue Ada, 34392 Montpellier

More information