A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

Size: px
Start display at page:

Download "A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces"

Transcription

1 A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA Abstact. We study esouce management in distibuted systems. Incoect handling of esouces may lead to deadlocks, missed deadlines, pioity invesions, and othe foms of incoect behavio o degaded pefomance. While in centalized systems deadlock avoidance is commonly used to ensue coect and efficient esouce allocation, distibuted deadlock avoidance is hade, and geneal solutions ae consideed impactical due to the high communication ovehead. Howeve, solutions that use only opeations on local data exist if some static infomation about the possible sequences of emote invocations is known. We pesent a family of efficient distibuted deadlock avoidance algoithms that subsumes peviously known solutions as special instances. Even though diffeent potocols within the family allow diffeent levels of concuency and consequently fewe o moe executions, we pove that they all have the same set of eachable states, expessed by a global invaiant. This esult enables: (1) a design pinciple: the use of diffeent potocols at diffeent sites does not compomise deadlock avoidance; (2) a poof pinciple: any esouce allocation potocol that peseves the global invaiant and whose allocation decisions ae at least as libeal as those of the least libeal in the family, guaantees absence of deadlock. 1 Intoduction Middlewae sevices play a key ole in the development of moden distibuted eal-time and embedded (DRE) systems. DRE systems often consist of a vaiety of hadwae and softwae components, each with thei own potocols, intefaces, opeating systems, and API s. Middlewae sevices hide this heteogeneity, allowing the softwae enginee to focus on the application, by poviding a high-level unifom inteface, and handling management of esouces and communication and coodination between components. Howeve, this appoach is effective only if these sevices ae well-defined, flexible and efficient. In this pape we focus on esouce allocation sevices fo DRE systems. Computations in distibuted systems often involve a distibution of method calls ove This eseach was suppoted in pat by NSF gants CCR , CCR , CCR , CNS , and CCF , and by NAVY/ONR contact N

2 2 multiple sites. At each site these computations need esouces, fo example in the fom of theads, to poceed. With multiple pocesses stating and unning at diffeent sites, and a limited numbe of theads at each site, deadlock may aise. Taditionally thee methods ae used to deal with deadlock: pevention, avoidance and detection. In deadlock pevention a deadlock state is made uneachable by, fo example, imposing a total ode in which esouces ae acquied, such as in monotone locking [1, 4]. This stategy can substantially educe pefomance, by atificially limiting concuency. With deadlock detection, common in databases, deadlock states may occu, but ae upon detection esolved by, fo example, oll-back of tansactions. In embedded systems, howeve, this is usually not an option, especially in systems inteacting with physical devices. Deadlock avoidance methods take a middle oute. At untime a potocol is used to decide whethe a esouce equest is ganted based on cuent esouce availability and possible futue equests of pocesses in the system. A esouce is ganted only if it is safe, that is, if thee is a stategy to ensue that all pocesses can complete. To make this test feasible, pocesses that ente the system must announce thei possible esouce usage. This idea was fist poposed in centalized systems by Dijksta in his Banke s algoithm [2, 3, 13, 11], whee pocesses epot the maximum numbe of esouces that they can equest. When esouces ae distibuted acoss multiple sites, howeve, deadlock avoidance is hade because the diffeent sites may have to consult each othe to detemine whethe a paticula allocation is safe. Consequently, a geneal solution to distibuted deadlock avoidance is consideed impactical [12]; the communication costs involved simply outweigh the benefits gained fom deadlock avoidance ove deadlock pevention. We study distibuted deadlock avoidance algoithms that do not equie any communication between sites. Ou algoithms ae applicable to distibuted systems in which pocesses pefom emote method invocations and lock local esouces (theads) until all emote calls have etuned. In paticula, if the chain of emote calls aives back to a site peviously visited, then a new esouce is needed. This aises, fo example, in DRE achitectues that use the WaitOnConnection policy fo nested up-calls [9, 10, 14]. Ou algoithms succeed in poviding deadlock avoidance without any communication ovehead by using static pocess infomation in the fom of call gaphs that epesent all possible sequences of emote invocations. In DRE systems, this infomation can usually be extacted fom the component specifications o fom the souce code diectly by static analysis. In this pape we analyze the common popeties of a family of deadlock avoidance potocols that include the potocols we pesented in ealie papes [8, 7, 6]. We show that the two potocols Basic-P intoduced in [8] and Live-P pesented in [6] ae the two extemes of a spectum of potocols that allow, going fom Basic-P to Live-P, inceasing levels of concuency. Despite these diffeent levels of concuency, and thus executions pemitted, we pove that all potocols in the family have the same set of eachable states. The significance of this esult is that it allows unning diffeent potocols fom the family at diffeent sites

3 3 without compomising deadlock. In addition, it consideably simplifies poving coect modifications and efinements of these potocols, as poofs educe to showing that the new potocol peseves the same invaiant. The est of this pape is stuctued as follows. Section 2 descibes the computational model and Section 3 intoduces the potocols. Section 4 chaacteizes the diffeent levels of concuency by compaing allocation sequences fo the diffeent potocols, and Section 5 pesents the poof that all potocols have the same set of eachable states. Section 6 concludes with some emaks about the design pinciple enabled by ou esults and some open poblems. 2 Computational Model We model a distibuted system as a set of sites that pefom computations and a call gaph, which povides a static epesentation of all possible esouce usage pattens. Fomally, a distibuted system is a tuple S : R, G consisting of R : { 1,..., R }, a set of sites, and G : V,, I a call gaph specification. A call gaph specification G : V,, I consists of a diected acyclic gaph V,, which captues all the possible sequences of emote calls that pocesses can pefom. The set of initial nodes I V contains those methods that can be invoked when a pocess is spawned. A call-gaph node n: epesents a method n that uns in site. We also say that node n esides in site. If two nodes eside in the same site we wite n R m. An edge fom n: to m:s denotes that method n, in the couse of its execution may invoke method m in site s. We assume that each site has a fixed numbe of pe-allocated esouces. Although in many moden opeating systems theads can be spawned dynamically, many DRE systems pe-allocate fixed sets of theads to avoid the elatively lage and vaiable cost of thead ceation and initialization. Each site maintains a set of local vaiables V that includes the constant T 1 denoting the numbe of esouces pesent in, and a vaiable t that epesents the numbe of available esouces. Initially, t = T. The execution of a system consists of pocesses, ceated dynamically, executing computations that only pefom emote calls accoding to the edges in the call gaph. When a new pocess is spawned it stats its execution with the gaph node whose outgoing paths descibe the emote calls that the pocess can pefom. All invocations to a call gaph node equie a new esouce in the coesponding site, while call etuns elease a esouce. We impose no estiction on the topology of the call gaph o on the numbe of pocess instances, and thus deadlocks can be eached if all equests fo esouces ae immediately ganted. Example 1. Conside a system with two sites R = {, s}, a call gaph with fou nodes V = {n 1, n 2, m 1, m 2 }, whee n 1 and m 1 ae initial, and edges: n 1 n 2 s m 1 s m 2 This system has eachable deadlocks if no contolle is used. Let sites s and handle exactly two theads each. If fou pocesses ae spawned, two instances of

4 4 n 1 and two of m 1, all esouces in the system will be locked afte each pocess stats executing its initial node. Consequently, the allocation attempts fo n 2 and m 2 will be blocked indefinitely, so no pocess will teminate o etun a esouce. This allocation sequence is depicted below, whee a epesents an existing pocess that ties to acquie a esouce at a node (if pecedes the node) o has just been ganted the esouce (if appeas afte the node). n 1 t = 2 t s = 2 n 2 s t = 0 t s = 2 n 1 n 2 s t = 0 t s = 0 n 1 n 2 s m 1 s m 2 m 1 s m 2 m 1 s m 2 Ou deadlock avoidance solution consists of two pats: (1) the offline calculation of annotations, maps fom call-gaph nodes to natual numbes; and (2) a un-time potocol that contols esouce allocations based on these annotations. Infomally, an annotation measues the numbe of esouces equied fo a computation. The potocols gant a equest based on the emaining local esouces (and possibly othe local vaiables) and the annotation of the equesting node. Potocol A potocol fo contolling the esouce allocation in node n : is implemented by a pogam executed in befoe and afte method n is dispatched. This code can be diffeent fo diffeent call-gaph nodes even if they eside in the same site. The schematic stuctue of a potocol fo a node n: is: n :: f() when En n (V ) do In n (V, V ) Out n (V, V ) } enty section } method invocation } exit section Upon invocation, the enty section checks esouce availability by inspecting local vaiables V of site. If the pedicate En n (V ), called the enabling condition, is satisfied we say that the enty section is enabled. In this case, the equest can be ganted and the local vaiables ae updated accoding to the elation In n (V, V ) (whee V stands fo the local vaiables afte the action is taken). We assume that the enty section is executed atomically, as a test-and-set. The method invocation section executes the code of the method, hee epesented as f(), which may pefom emote calls accoding to the edges outgoing fom node n in the call gaph. The method invocation can only teminate afte all its invoked calls (descendants in the call gaph) have teminated and etuned. The exit section eleases the esouce and may update some local vaiables in site, accoding to the elation Out n (V, V ). In n is called the enty action and Out n is called the exit action.

5 5 Annotations Given a system S and annotation α, the annotated call gaph (V,, ) is obtained fom the call gaph (V, ) by adding one edge n m between any two nodes that eside in the same site with annotation α(n) α(m). A node n depends on a node m, which we epesent n m, if thee is a path in the annotated gaph fom n to m that follows at least one edge. The annotated gaph is acyclic if no node depends on itself, in which case we say that the annotation is acyclic. 3 A Family of Local Potocols Ou goal is to constuct potocols that (1) avoid deadlock in all scenaios, (2) equie no communication between sites, and (3) maximize esouce utilization (gant equests as much as possible without compomising deadlock feedom). The fist potocol we poposed was Basic-P [8], shown in Fig. 1 fo a node n: [ ] with annotation α(n) = i. Upon a esouce when i t do equest, Basic-P checks whethe the num- t -- be of available esouces is lage enough, n :: f() as indicated by the annotation i. This check t ++ ensues that pocesses (local o emote) that could potentially be blocked if the esouce is ganted, have enough esouces to Fig. 1. The potocol Basic-P. complete. The coectness of Basic-P is based on the acyclicity of the annotations: Theoem 1 (Annotation Theoem fo Basic-P [8]). Given a system S and an acyclic annotation, if Basic-P is used to contol esouce allocations then all executions of S ae deadlock fee. Example 2. Reconside the system fom Example 1. The left diagam below shows an annotated call gaph with α(n 1 ) = α(n 2 ) = α(m 2 ) = 1 and α(m 1 ) = 2. It is acyclic, and thus by Theoem 1, if Basic-P is used with these annotations, the system is deadlock fee. n 1 1 n 2 s 1 n 1 1 n 2 s 1 m 1 s 2 m 2 1 m 1 s 1 m 2 1 Let us compae this with Example 1 whee a esouce is ganted simply if it is available. This coesponds to using Basic-P with the annotated call gaph above on the ight, with α(n) = 1 fo all nodes. In Example 1 we showed that a deadlock is eachable, and indeed this annotated gaph is not acyclic; it contains dependency cycles, fo example n 1 n 2 m 1 m 2 n 1. Theefoe Theoem 1 does not apply. In the diagam on the left all dependency cycles ae boken by the annotation α(m 1 ) = 2. Requiing the pesence of at least two esouces fo ganting a esouce at m 1 ensues that the last esouce available in s can only be obtained at n 2, which beaks all possible cicula waits.

6 6 2» 3 2» 3 when 1 t do when i p 1 t do n :: 6 t f() 5 n :: 6 p --, t f() 5 t ++ t ++, p ++ If i = 1 If i > 1 Fig. 2. The potocol Efficient-P. The potocol Basic-P can be impoved using the obsevation that pocesses equesting esouces to execute nodes with annotation 1 can always teminate, in spite of any othe pocess in the system. This obsevation leads to Efficient-P (shown in Fig. 2), which uses two countes: t, as befoe; and p, to keep tack of the potentially ecoveable esouces, which include not only the available esouces but also the esouces ganted to pocesses in nodes with annotation 1. A simila vesion of the Annotation Theoem fo Efficient-P establishes that in the absence of dependency cycles, Efficient-P can each no deadlocks. The poof of the Annotation Theoem fo Basic-P and Efficient-P [8] elies on showing that the following global invaiant ϕ is maintained: ϕ def = = A [k] T (k 1). R k T ϕ [k] with ϕ [k] def whee a [k] stands fo the numbe of active pocesses unning in site executing nodes with annotation k and A [k] stands fo j k a [j], that is, A [k] epesents the numbe of active pocesses unning in site executing nodes with annotation [ ] (i) when ϕ do a [i]++ n :: f() a [i]-- Fig. 3. The potocol Live-P. k o highe. In [6] we exploited this fact by constucting the potocol Live-P, shown in Fig. 3, which gants access to a esouce pecisely wheneve ϕ is peseved. This potocol not only guaantees absence of deadlock, it also povides, in contast with Basic-P, individual liveness fo all pocesses. Its enabling condition, pecondition fo ϕ of the tansition that gants the esouce: def = A [k] T (k 1) k>i A [k] + 1 T (k 1) k i, is exactly the weakest We use [j] fo the clause of that coesponds to annotation j. Obseve that [j] is syntactically identical to ϕ [j] fo j > i. Moeove, fo j i, [j] implies ϕ [j]. To compae the potocols we estate Basic-P and Efficient-P in tems of the notation intoduced fo Live-P. The enabling condition of Basic-P be-

7 2 " # 3 when χ (i) [1] do a n :: [i] f() 5 a [i]-- (a) 1-Efficient-P 2 n :: 6 4 f() " when ϕ (i) a [i]-- [1] χ (i) a [i]++ (b) 2-Efficient-P # 3 [2] do Fig. 4. Basic-P and Efficient-P estated using stengthenings. comes: A [1] T (i 1) which is, as we will see, stonge than, that is, the enabling condition of Basic-P implies that of Live-P. Given k i we define the k-th stengthening fomula fo a equest in node n: with annotation i as: χ (i) [k] def = A [k] T (i 1) It is easy to see that the following holds fo all k j i, χ (i) [k] [j] and theefoe χ (i) [k] [j]. k j i Also, if ϕ holds befoe the esouce is ganted, then [j] also holds fo all i j, since the fomulas fo [j] and ϕ [j] ae identical in this case. Hence: χ (i) [k] [j]. (1) k j Finally, if can be concluded: [j] is satisfied fo all values less than k, and χ (i) ( j<k [j]) χ (i) [k] ( j<k [j]. [j]) ( j k [j]) [k] is ensued, Theefoe, if a potocol ensues that fo some k, both j<k ϕ(i) [j] and the k- stengthening χ (i) [k] hold, then ϕ is an invaiant. In geneal, the lowe the value of the stengthening point k, the less computation is needed to compute the pedicate (the numbe of compaisons is educed) but the less libeal the enabling condition becomes. In the case of k = 1 the stengthening is χ (i) [1], and the potocol obtained (see Fig. 4(a)) is equivalent

8 8 Fig. 6. A compaison of Basic-P, k-efficient-p and Live-P. to Basic-P. Note that this potocol is logically equivalent to Basic-P: the esult of the enabling condition, and the effect of the input and output actions on futue tests ae the same. The implementation of Basic-P intoduced ealie uses a single counte t, while in this estated vesion, seveal countes ae used: a [i] and A [1]. Howeve, the effect on A [1] of the incements and decements of a [i] ae independent of i. Theefoe, these actions can be implemented as A [1]++ and A [1]-- espectively. Similaly, with a stengthening point of k = 2 we obtain a potocol equivalent to Efficient-P, shown in Fig. 4(b). The geneal fom of ou family of potocols can now be given as k-efficient- P, shown in Fig. 5. It coves the full spectum of potocols with Basic-P, which is equivalent to 1-Efficient-P, at one end and Live-P, which is equal to T - Efficient-P at the othe end of the spectum. The potocols k-efficient- P can be implemented in seveal ways. The simplest implementation needs when ( j<k n :: f() a [i]-- [j]) χ (i) a [i]++ [k] do Fig. 5. The potocol k-efficient-p. space O(k log T ) to stoe k countes and equies O(k) opeations pe allocation decision. A moe sophisticated implementation using an active tee data-stuctue still needs O(k log T ), but equies only O(log k) opeations pe allocation decision [6]. Fig. 6 pesents some expeimental esults that compae concuency levels allowed by the diffeent potocols. The figues depict the maximum annotation allowed by each potocol as a function of the load (total numbe of active pocesses). The load is ceated by annotations picked unifomly at andom. 4 Allocation Sequences In this section we compae the set of uns allowed by each potocol. We captue these sets by languages ove an alphabet of allocations and deallocations. Given a call gaph (V, ) let the set V contain a symbol n fo evey n in V. The allocation alphabet Σ is the disjoint union of V and V. Symbols in V

9 9 ae called allocation symbols, while symbols in V ae efeed to as deallocation symbols. Given a sting s in Σ and a symbol v in Σ we use s v fo the numbe of occuences of v in s, and s n to stand fo s n s n. A well-fomed allocation sting s is one fo which evey deallocation occus afte a matching allocation, that is, fo evey pefix p of s, p n 0. An admissible allocation sequence is one that coesponds to a pefix un of the system, accoding to the call gaph. This equies (1) that the sting be well-fomed, (2) that evey allocation of a nonoot node is peceded by a matching allocation of its paent node, and (3) that evey deallocation of a node is peceded by a coesponding deallocation of its childen nodes. Fomally, Definition 1 (Admissible Stings). A well-fomed allocation sting s is called admissible if fo evey pefix p of s, and evey emote call n m: p n p m. Admissible stings ensue that the numbe of child pocesses (callees) is not highe than the numbe of paents (calle pocesses), so that thee is a possible match. Fo bevity, we simply use sting to efe to admissible sting. We say that a potocol is completely local if all the enabling conditions ae detemined by: (1) the annotation of the call-gaph node equested, and (2) the set of active pocesses in the local site and thei annotations. It is easy to see that the potocols k-efficient-p ae completely local. We use the values of a [ ] and A [ ] as the (abstact) global states of the system since these values captue all effects of completely local potocols in the outcomes of futue equests. The initial state of the system, denoted by Θ, is a [i] = A [i] = 0 fo all sites and annotations i. Given a state σ and a potocol P, if the enabling condition of P fo a node n is satisfied at σ we wite En P n (σ). Fo convenience, we intoduce a new state to captue sequences that a potocol fobids, and equie that En P n ( ) does not hold. We denote by P (s) the 1 state eached by P afte execising the allocation sting s, defined inductively as P (ɛ) = Θ and: P (s n) = { In P n (P (s)) if EnP n (P (s)) othewise P (s n) = { Out P n (P (s)) if P (s) othewise We say that a sting s is accepted by a potocol P if P (s). The set of stings accepted by P is denoted by L(P ), and we use P Q fo the patial ode defined by language inclusion L(P ) L(Q). Example 3. Reconside the system in Example 1. The allocation sequence that leads to a deadlock is s : n 1 n 1 m 1 m 1. Even though n 1 n 1 m 1 is in L(Basic-P), the enabling condition of m 1 becomes disabled, so Basic-P(s) = and s / L(Basic-P). Lemma 1. The following ae equivalent: 1 All ou potocols ae deteministic but the esults can be adapted fo nondeteministic potocols as well.

10 10 (i) L(P ) L(Q). (ii) Fo all stings s and allocation symbols n, if En P n (P (s)) then En Q n (Q(s)). Poof. We pove both implications sepaately: Assume L(P ) L(Q), and let s and n be such that En P n (P (s)). Since s L(P ) then s L(Q). Moeove, s n L(P ) and then s n L(Q). Hence, En Q n (Q(s)). Assume now (ii). We eason by induction on stings: Fist, both ɛ L(P ) and ɛ L(Q). Let s n L(P ). Then En P n (P (s)), so also En Q n (Q(s)). Hence, s n L(Q). Let s n L(P ). This implies s L(P ) and by inductive hypothesis s L(Q). Then s n L(Q), as desied. Theefoe (i) and (ii) ae equivalent. Let P, Q be any two of Basic-P, Efficient-P, k-efficient-p and Live-P. We showed in Section 3 that the enty and exit actions ae identical fo all these potocols. Theefoe, if s is in the language of both P and Q then the states eached ae the same, i.e., P (s) = Q(s). It follows that if fo all states σ, En P n (σ) implies EnQ n (σ), then L(P ) L(Q). Lemma 2. If j-efficient-p allows an allocation then k-efficient-p also allows the allocation, povided j k. Poof. Let j k. It follows fom the definition that χ (i) [j] implies χ (i) [k]. Moeove, by (1), χ (i) [j] implies j l k ϕ(i) [l]. Consequently, l<j [l] χ (i) [j] } {{ } En j-efficient-p n l<k [l] χ (i) [k] } {{ } En k-efficient-p n Theefoe if j-efficient-p allows a equest so does k-efficient-p. Lemma 2 states that the enabling condition of k-efficient-p becomes weake as k gows, that is, the enabling condition of Basic-P is stonge than that of Efficient-P, which in tun is stonge than k-efficient-p, which is stonge than Live-P. An immediate consequence of Lemma 2 is: Basic-P Efficient-P... k-efficient-p... Live-P The following examples show that these language containments ae stict: Basic-P Efficient-P... k-efficient-p... Live-P which is depicted in Fig 7(a).

11 L(Live-P) L(k-Efficient-P) L(Efficient-P) ϕ a-states = = S(Live-P) = S(Efficient-P) L(Basic-P) = S(k-Efficient-P) = S(Basic-P) (a) Allocation sequences (b) Reachable state spaces Fig. 7. Compaison of the family of potocols 11 Example 4. Conside the following call-gaph, with initial esouces T = 2. n 2 2 n 1 1 m 1 1 The sting m 1 n 2 is accepted by Efficient-P but not by Basic-P. This system can be genealized to show that thee is a sting accepted by k-efficient-p but not by j-efficient-p (fo j < k). Conside the following annotated call gaph, with initial esouces T = j + 1. n j+1 j+1 n j j n j 1 j 1 n 1 1 m j j j 1 m j 1 m 1 1 The sting m j n j+1 is accepted by k-efficient-p, but is not accepted by j- Efficient-P. 5 Reachable State Spaces The eachable state space of a potocol P, denoted by S(P ), is the set of global states that P can each following some admissible allocation sequence. Clealy, fo two potocols P and Q, if thei actions ae equivalent and P Q then evey state eachable by P is also eachable by Q. Indeed any allocation sting that eaches a state fo P also eaches that same state fo Q. Lemma 3. Fo evey two potocols P and Q with the same enty and exit actions, if P Q then S(P ) S(Q). Consequently, S(Basic-P) S(Efficient-P)... S(k-Efficient-P)... S(Live-P)

12 12 Let S(ϕ a ) descibe the set of states that satisfy ϕ and that ae eachable by some admissible allocation sting. In the est of this section we show that the above containment elation collapses into equalities by poving S(Basic-P) = S(Live-P) = S(ϕ a ) The poof elies on the existence of a pefeence ode on the nodes of the annotated call gaph, such that, if allocations ae made following this ode, then evey allocation equest that succeeds in Live-P also succeeds in Basic-P. 5.1 Pefeence Odes A pefeence ode of an annotated call gaph is an ode on the nodes such that, if all allocations in a given admissible sting ae pefomed following that ode, then (1) the sequence obtained is also admissible, and (2) highe annotations fo each site ae visited fist. This will allow us to show that Basic-P can each all ϕ a -states. Given a call gaph, a total ode > on its nodes is called topological if it espects the descendant elation, that is, if fo evey pai of nodes n and m, if n m then n > m. Analogously, we say that an ode > espects an annotation α if fo evey pai of nodes n and m esiding in the same site, if α(n) > α(m) then n > m. A total ode that is topological and espects annotations is called a pefeence ode. Lemma 4. Evey acyclically annotated call gaph has a pefeence ode. Poof. The poof poceeds by induction on the numbe of call-gaph nodes. The esult tivially holds fo the empty call gaph. Fo the inductive step, assume the esult holds fo all call gaphs with at most k nodes and conside an abitay call gaph with k + 1 nodes. Fist, thee must be a oot node whose annotation is the highest among all the nodes esiding in the same site. Othewise a dependency cycle can be fomed: take the maximal nodes fo all sites, which ae intenal by assumption, and thei oot ancestos. Fo evey maximal (intenal) node thee is + path eaching it, stating fom its coesponding oot. Similaly, fo evey oot thee is an incoming edge fom the maximal intenal node that esides in its site. A cycle exists since the (bipatite) subgaph of oots and maximal nodes is finite, and evey node has a successo (a + fo oot nodes, and a fo maximal nodes). This contadicts that the annotation is acyclic. Now, let n be a maximal oot node, and let > be a pefeence ode fo the gaph that esults by emoving n, which exists by inductive hypothesis. We extend > by adding n > m fo evey othe node m. The ode is topological since n is a oot. The ode espects annotations since n is maximal in its site. 5.2 Reachable States A global state of a distibuted system is admissible if all existing pocesses (active o waiting) in a node n ae also existing, and active, in evey node ancesto of

13 13 n. That is, if the state coesponds to the outcome of some admissible allocation sequence. Theoem 2. The set of eachable states of a system using Live-P is pecisely the set of ϕ a -states. Poof. It follows diectly fom the specification of Live-P that all eachable states satisfy ϕ. Theefoe, we only need to show that all ϕ a -states ae eachable. We poceed by induction on the numbe of active pocesses in the system. The base case, with no active pocess, is the initial state of the system Θ, which is tivially eachable by Live-P. Fo the inductive step, conside now an abitay ϕ a -state σ with some active pocess. Since the call gaph is acyclic and finite, thee must be some active pocess P in σ with no active descendants. The state σ obtained by emoving P fom σ is an admissible ϕ a -state (all the conditions of admissibility and the clauses of ϕ ae eithe simplified o identical); by the inductive hypothesis, σ is eachable by Live-P. Since σ is obtained fom σ by an allocation that peseves ϕ (othewise σ would not be a ϕ a -state), then σ is eachable by Live-P. Theoem 2 states that fo evey sequence s that leads to a ϕ a -state thee is a sequence s aiving at the same state fo which all pefixes also each ϕ a -states. The sequence s is in the language of Live-P. Pehaps somewhat supisingly, the set of eachable states of Basic-P is also the set of all ϕ a -states. To pove this we fist need an auxiliay lemma. Lemma 5. In evey ϕ a -state, an allocation equest in site with annotation k has the same outcome using Basic-P and Live-P, if thee is no active pocess in with annotation stictly smalle than k. Poof. Fist, in evey ϕ a -state, if Basic-P gants a esouce so does Live-P, by Lemma 2. We need to show that in evey ϕ a -state, if Live-P gants a equest of k and a [j] = 0 fo all j < k, then Basic-P also gants the equest. In this case, T T T t = A [1] = a [j] = a [j] = A [k], (2) j=1 and since Live-P gants the equest, then A [k] + 1 T (k 1) and A [k] T k. Using (2), T t T k, and t k, so Basic-P also gants the esouce. Theoem 3. The set of eachable states of a system using Basic-P is pecisely the set of ϕ a -states. Poof. The poof is analogous to the chaacteization of the eachable states of Live-P, except that the pocess P emoved in the inductive step is chosen to be a minimal active pocess in some pefeence ode >. This guaantees that P has no childen (by the topological popety of >), and that thee is no active pocess in the same site with lowe annotation (by the annotation especting popety of >). Consequently, Lemma 5 applies, and the esulting state is also eachable by Basic-P. j=k

14 14 Theoem 3 can also be estated in tems of allocation sequences. Fo evey admissible allocation sting that aives at a ϕ a -state thee is an admissible allocation sting that aives at the same state and (1) contains no deallocations, and (2) all the nodes occu accoding to some pefeence ode. It follows fom Theoem 3 that S(Basic-P) = S(ϕ a ), and hence, as depicted in Fig 7(b): S(Basic-P) = S(Efficient-P) =... = S(k-Efficient-P) =... = S(Live-P). 6 Applications and Conclusions We have genealized ou ealie distibuted deadlock avoidance algoithms by intoducing a family of potocols defined by stengthenings of the global invaiant ϕ. The most libeal potocol, Live-P, also ensues liveness, at the cost of maintaining moe complicated data-stuctues (which equie a non-constant numbe of opeations pe allocation equest). The simplest potocol, Basic-P, can be implemented with one opeation pe equest, but allows less concuency. We have shown that all the eachable state spaces of the potocols ae the same. This esult allows a system designe moe feedom in the implementation of a deadlock avoidance potocol, because it follows that evey local potocol P that satisfies the following conditions fo evey equest is guaanteed to avoid deadlock: (1) if Basic-P is enabled then P is enabled, and (2) if P is enabled then Live-P is enabled This holds because all P -eachable states satisfy ϕ, and fom those states Basic- P guaantees deadlock feedom. Infomally, (2) guaantees that the system stays in a safe egion, while (1) ensues that enough pogess is made. This esult implies, fo example, that the combination of diffeent potocols at diffeent sites is safe. If a site has a constaint in memoy o CPU time, then the simple Basic-P is pefeable, while Live-P is a bette choice if a site needs to maximize concuency. This esult also facilitates the analysis of altenative potocols. Poving a potocol coect (deadlock feedom) can be a had task if the potocol must deal with scheduling, extenal envionment conditions, etc. With the esults pesented in this pape, to show that an allocation manage has no eachable deadlocks, it is enough to map its eachable state space to an abstact system fo which all states guaantee ϕ, and all allocation decisions ae at least as libeal as in Basic-P. This technique is used in [5] to ceate an efficient distibuted pioity inheitance mechanism whee pioities ae encoded as annotations, and pioity inheitance is pefomed by an annotation decease. Although this annotation decease tansition is not allowed by the potocols pesented hee, since the esulting state is still a ϕ-state, it is also eachable by Basic-P (maybe using a diffeent sequence). Theefoe, deadlocks ae avoided. Topics fo futhe eseach include (1) the question whethe Live-P is optimal, that is, does thee exist a completely local potocol P that guaantees deadlock avoidance such that Live-P P, and (2) the question whethe k- Efficient-P is optimal with O(k log T ) stoage space.

15 15 Refeences 1. Andew D. Biell. An intoduction to pogamming with theads. Reseach Repot 35, Digital Equipment Copoation Systems Reseach Cente, Edsge W. Dijksta. Coopeating sequential pocesses. Technical Repot EWD- 123, Technological Univesity, Eindhoven, the Nethelands, Aie N. Habemann. Pevention of system deadlocks. Communications of the ACM, 12: , James W. Havende. Avoiding deadlock in multi-tasking systems. IBM Systems Jounal, 2:74 84, Césa Sánchez, Henny B. Sipma, Chistophe D. Gill, and Zoha Manna. Distibuted pioity inheitance fo eal-time and embedded systems. In Alex Shvatsman, edito, Poceedings of the 10th Intenational Confeence On Pinciples Of Distibuted Systems (OPODIS 06), volume 4305 of LNCS, Bodeaux, Fance, Spinge-Velag. 6. Césa Sánchez, Henny B. Sipma, Zoha Manna, and Chistophe Gill. Efficient distibuted deadlock avoidance with liveness guaantees. In Sang Lyul Min and Wang Yi, editos, Poceedings of the 6 th ACM & IEEE Intenational Confeence on Embedded Softwae (EMSOFT 06), pages 12 20, Seoul, South Koea, Octobe ACM & IEEE. 7. Césa Sánchez, Henny B. Sipma, Zoha Manna, Venkita Subamonian, and Chistophe Gill. On efficient distibuted deadlock avoidance fo distibuted eal-time and embedded systems. In Poceedings of the 20th IEEE Intenational Paallel and Distibuted Pocessing Symposium (IPDPS 06), Rhodas, Geece, IEEE Compute Society Pess. 8. Césa Sánchez, Henny B. Sipma, Venkita Subamonian, Chistophe Gill, and Zoha Manna. Thead allocation potocols fo distibuted eal-time and embedded systems. In Fan Wang, edito, 25th IFIP WG 2.6 Intenational Confeence on Fomal Techniques fo Netwoked and Distibuted Systems (FORTE 05), volume 3731 of LNCS, pages , Taipei, Taiwan, Octobe Spinge-Velag. 9. Douglas C. Schmidt. Evaluating Achitectues fo Multi-theaded CORBA Object Request Bokes. Communications of the ACM Special Issue on CORBA, 41(10):54 60, Octobe Douglas C. Schmidt, Michael Stal, Hans Rohnet, and Fank Buschmann. Patten- Oiented Softwae Achitectue: Pattens fo Concuent and Netwoked Objects, Volume 2. Wiley & Sons, New Yok, Abaham Silbeschatz, Pete B. Galvin, and Geg Gagne. Opeating System Concepts. John Wiley & Sons, Inc., New Yok, NY, Sixth edition, Mukesh Singhal and Nianjan G. Shivaati. Advanced Concepts in Opeating Systems: Distibuted, Database, and Multipocesso Opeating Systems. McGaw- Hill, Inc., New Yok, NY, William Stallings. Opeating Systems: Intenals and Design Pinciples. Pentice Hall, Inc., Uppe Saddle Rive, NJ, Thid edition, Venkita Subamonian, Guoliang Xing, Chistophe D. Gill, Chenyang Lu, and Ron Cyton. Middlewae specialization fo memoy-constained netwoked embedded systems. In Poc. of 10th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 04). IEEE Compute Society Pess, May 2004.

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

arxiv: v1 [cs.lo] 3 Dec 2018

arxiv: v1 [cs.lo] 3 Dec 2018 A high-level opeational semantics fo hadwae weak memoy models axiv:1812.00996v1 [cs.lo] 3 Dec 2018 Abstact Robet J. Colvin School of Electical Engineeing and Infomation Technology The Univesity of Queensland

More information

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons.

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons. Counting Convex Polygons in Plana Point Sets Joseph S. B. Mitchell a;1, Günte Rote b, Gopalakishnan Sundaam c, and Gehad Woeginge b a Applied Mathematics and Statistics, SUNY Stony Book, NY 11794-3600.

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Using Data Flow Diagrams for Supporting Task Models

Using Data Flow Diagrams for Supporting Task Models in Companion Poc. of 5 th Euogaphics Wokshop on Design, Specification, Veification of Inteactive Systems DSV-IS 98 (Abingdon, 3-5 June 1998), P. Makopoulos & P. Johnson (Eds.), Spinge-Velag, Belin, 1998.

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context. An Improved Equivalence Algorithm

UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context. An Improved Equivalence Algorithm Disjoint-sets data type Lectue slides by Kevin Wayne Copyight 5 Peason-Addison Wesley http://www.cs.pinceton.edu/~wayne/kleinbeg-tados UNION FIND naïve linking link-by-size link-by-ank path compession

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18 Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

Monitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next?

Monitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next? Monitos Lectue 6 Monitos Summay: Last time A combination of data abstaction and mutual exclusion Automatic mutex Pogammed conditional synchonisation Widely used in concuent pogamming languages and libaies

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

A General Characterization of Representing and Determining Fuzzy Spatial Relations

A General Characterization of Representing and Determining Fuzzy Spatial Relations 7 The Intenational Aab Jounal of Infomation Technolog A Geneal Chaacteization of Repesenting and Detemining Fuzz Spatial Relations Lui Bai and Li Yan 2 College of Infomation Science and Engineeing, Notheasten

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

Symbolic Verification of ECA Rules

Symbolic Verification of ECA Rules Symbolic Veification of ECA Rules Xiaoqing Jin, Yousa Lembacha, and Gianfanco Ciado Depatment of Compute Science and Engineeing, Univesity of Califonia, Riveside {jinx,ylemb00,ciado}@cs.uc.edu Abstact.

More information

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994. The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Evaluation of Partial Path Queries on XML Data

Evaluation of Partial Path Queries on XML Data Evaluation of Patial Path Queies on XML Data Stefanos Souldatos Dept of EE & CE NTUA, Geece stef@dblab.ntua.g Theodoe Dalamagas Dept of EE & CE NTUA, Geece dalamag@dblab.ntua.g Xiaoying Wu Dept. of CS

More information

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme

More information

Experimental and numerical simulation of the flow over a spillway

Experimental and numerical simulation of the flow over a spillway Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,

More information

DUe to the recent developments of gigantic social networks

DUe to the recent developments of gigantic social networks Exploing Communities in Lage Pofiled Gaphs Yankai Chen, Yixiang Fang, Reynold Cheng Membe, IEEE, Yun Li, Xiaojun Chen, Jie Zhang 1 Abstact Given a gaph G and a vetex q G, the community seach (CS) poblem

More information

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems Achievable Catalog Size in Pee-to-Pee Video-on-Demand Systems Yacine Boufkhad, Fabien Mathieu, Fabien De Montgolfie, Diego Peino, Lauent Viennot To cite this vesion: Yacine Boufkhad, Fabien Mathieu, Fabien

More information