Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Size: px
Start display at page:

Download "Partial Character Decoding for Improved Regular Expression Matching in FPGAs"

Transcription

1 Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia Abstrat High-speed string pattern mathing in hardware is required in many appliations inluding Network Intrusion Detetion appliations Regular expressions are one method to implement suh mathing and are often built in FPGAs using non-deterministi finite automata (NFAs) To obtain high throughputs it is neessary to proess many bytes in This paper extends the modular NFA onstrution method of Sidhu and Prasanna to handle the proessing of many bytes in The paper also introdues the onept of partial harater deoding in whih harater math units are shared but the number of signals needed to be routed around the FPGA is redued over previous shared-deoder approahes With these approahes, throughput over 5Gbps is ahieved for the full default Snort rule-set (23401 literals) in a Xilinx Virtex FPGA Throughputs over 40Gbps are ahieved on smaller rule-sets Suggestions to improve performane are also given 1 Introdution There has been muh reent work on the topi of aelerated textual pattern mathing, and in partiular, regular expression mathing in FPGAs Muh of this has been in the ontext of Network Intrusion Detetion System (IDS) appliations - often using the rules from the Snort IDS [1] as a basis for testing A ommon and effiient method for implementing regular expression mathing in hardware is the non-deterministi finite automaton (NFA) Sine Sidhu and Prasanna [2] demonstrated how FPGAs an effiiently implement NFAs, a number of authors have presented variations on their approah whih give better performane The work presented here extends the original modular building-blok approah of Sidhu and Prasanna [2] by presenting regular expression building bloks suitable for proessing an arbitrary number of bytes in The paper also extends the work of Clark and Shimmel [3] who used a shared harater deoder to more effiiently implement NFA regular expression iruits Our results show that in most irumstanes a partial deoding approah will give better results than a full 8-to- deoding of eah harater A program has been implemented whih onverts Snort rules into regular expressions and, from these, onstruts a strutural VHDL desription of an NFA iruit whih mathes the given patterns whilst proessing multiple bytes in The onstrution method uses the extended NFA building bloks and also uses the partial deoders proposed in this paper The remainder of this paper is organised as follows Setion 2 presents some bakground information Setion 3 desribes the modular multi-byte NFA building bloks and Setion 4 desribes the partial harater deoding approah Setion 5 desribes the results from the synthesis of a number of example regular expression engines Some disussion of the results and a desription of future enhanements is presented in Setion 6 followed by some onlusions in Setion 7 2 Bakground Information This setion presents bakground information on regular expressions, NFAs, NFA implementation in hardware, the Snort Network IDS tool, and other hardware approahes to Network IDS 21 Regular Expressions A regular expression is a pattern whih desribes a string (or strings) of haraters A regular expression onsists of both haraters (from some alphabet) and meta-haraters whih have speial meaning A regular expression r an be one of the following: a single harater, or literal from the alphabet of interest - this mathes exatly that harater;

2 a onatenation of two regular expressions, r 1 r 2 - this mathes regular expression r 1 immediately followed by r 2 ; an alternation of two regular expressions, r 1 r 2 - this mathes either r 1 or r 2 ; the losure (or star) of a regular expression, r 1 * - this mathes 0 or more ourrenes of r 1 (r 1 * is the same as r 1 r 1 r 1 r 1 r 1 r 1 where is the empty (zero-length) string); or a parenthesized regular expression, (r 1 ) - this mathes r 1 (parentheses are used for overriding preedene) More omplex regular expression syntaxes with many more meta-haraters (eg + [ ]? et) are available In all ases, suh an expression an be onverted to one using only the meta-haraters above (though often at the ost of greatly inreased pattern length) 1 22 Non-Deterministi Finite Automata (NFAs) A non-deterministi finite automaton (NFA) an be thought of as a direted graph whose nodes are states [5] There is a start state and one or more aepting or final states Transitions between states are labelled by any symbol from the alphabet or by, the empty string The NFA aepts a string a 2 a n if there is a path from the start state to an aepting state with labels, a 2, a n (The label may also appear any number of times) A deterministi finite automation (DFA) is an NFA in whih there are no paths labelled with and no two outgoing paths from any state are labelled with the same symbol At most one state of a DFA is ative, whereas an NFA may have any number of ative states Any NFA an be onverted to an equivalent DFA, though in the worst ase this will take O(n 2 ) time and O(n 2 ) spae where n is the number of states in the NFA Further details on NFAs an be found in [4] 23 NFAs and Regular Expressions 1 Suh a onversion may not lead to an effiient implementation but it will lead to orret one 2 Software implementations of regular expression mathing will typially use an equivalent DFA whih an math any harater in O(1) time Note however that the onversion proess from an NFA to a DFA may be O(n 2 ) in both time and spae NFAs are suited to regular expression mathing beause there is a diret mapping from any regular expression to an NFA [5] in O(n) time where n is the length of the regular expression A software implementation of an NFA an math a harater in O(n) time 2 In hardware, however, multiple state transitions an be onsidered in so a hardware NFA an math a harater in O(1) time The implementation of regular expressions in hardware was first examined over 20 years ago when Floyd and Ullman [5] showed that an NFA regular expression iruit an be implemented effiiently using a programmable-logi array (PLA) arhiteture More reently, Sidhu and Prasanna [2] showed that NFAs were an effiient method for implementing regular expressions in FPGAs Both approahes involve a simple onversion proess using one-hot enoding of the states As desribed in the following setion, a number of researhers have examined regular expression mathing in FPGAs 24 Regular Expression Mathing in FPGAs Sine the work of Sidhu and Prasanna [2] a number of authors have presented enhanements that improve pattern mathing performane Some of these are disussed below Huthings et al [6] report on a JHDL-based module generator This uses the modular approah of Sidhu and Prasanna, but also supports additional regular expression meta-haraters?, and [] The module-generator also reognises and shares hardware between patterns with ommon prefixes Charaters to be mathed are broadast to all harater math units, but a pipelined broadast tree is implemented to improve performane Mosola et al [8] take the approah that in many ases a DFA equivalent to an NFA would atually use fewer states Beause a DFA is always in a single state, suh an approah enables the state to be aptured in a small number of bits, whih is ideal for swapping pattern mathing ontexts in and out of hardware Their work proesses a single byte at a time but uses multiple engines in to aelerate mathing 25 Snort Snort [1] is an open-soure Network Intrusion Detetion System (IDS) Snort is onfigured with a set of rules whih desribe pakets of interest and the ation whih should be taken upon reeipt of suh pakets The rules an speify both paket header information (eg soure and/or destination IP addresses, port numbers et) as well as paket ontent information to be mathed against An example Snort rule (with some detail omitted) is: alert tp $EXTERNAL_NET any -> $HOME_NET 515 (msg:"exploit LPRng overflow"; flow: to_server,established; ontent: " B 08 8D 4B C B0 0B CD C0 FE C0 CD 80 E8 94 FF FF FF 2F E 2F A "; )

3 The rule speifies the ation to take (alert), the protool (tp), the soure and destination IP addresses and ports, some harateristis of the onnetion (flow: option) and the ontent to be mathed (ontent: option), in this ase expressed as a sequene of hexadeimal harater values Snort rules are often used as example patterns for FPGA-based pattern mathing implementations beause they represent a large real-world set of patterns 26 Other Approahes for Network IDS on FPGAs Network IDS implementations on FPGAs need not be based on NFAs or even regular expressions Other approahes have inluded (but are not limited to) DFAs [8], variations on the Knuth-Morris-Pratt (KMP) algorithm [9], Bloom filters [10], and ontent-addressable memory (CAM) based approahes [11],[12] This paper onentrates on the issue of effiiently implementing regular expression mathing in FP- GAs rather than Network IDS per se Network IDS, in the form of Snort rules, is used as the example domain 3 Regular Expression NFA Building Bloks i (a) () (b) i 1 i 2 o 1 o 2 o i 1 i 2 i 3 i 4 o 1 o 2 o 3 o 4 Building on the work of Sidhu and Prasanna [2], a building-blok approah to the onstrution of NFA iruits whih math regular expressions against multi-byte inputs is presented Regular expressions desribe patterns in a given alphabet of haraters In Network Intrusion Detetion appliations, the alphabet is the set of all possible byte values (ranging numerially from 0 to 255 if onsidered as an unsigned value) Implementations of regular expression engines (in both software and hardware) usually onsider one inoming symbol at a time As network speeds aelerate, Network Intrusion Detetion appliations have inreasing performane requirements, eg, needing to san network traffi at throughputs of many giga-bits per seond (Gbps) Suh throughputs are relatively easy to obtain in hardware, provided that more than one byte of the input stream an be sanned simultaneously in The easiest way to get greater performane (throughput) from a pattern mathing iruit is to extend it to handle multiple-bytes in Sidhu and Prasanna s single byte mathing unit (Fig 1 (a)) an be extended to handle multiple bytes in as Figure 1 Single harater NFA building bloks for (a) single byte mathing, (b) two bytes at a time, and () four bytes at a time Eah C blok is a harater math unit shown in Fig 1 (b) and () In eah ase, the flip-flop holds the NFA state bit For the single-byte ase, a 1 stored in the flipflop means that if the urrent harater passes the harater math unit C, then we enable the subsequent state (ie output o will be high) The multi- (n) byte ase extends the byte mathing unit to have n harater math units - one examining eah byte of the n-byte input data If the flip-flop holds a 1, output o 2 will be high if byte one mathes the given harater - ie the iruit is indiating to the next stage that it should look for math on byte two If i 2 is high, o 3 will be high if byte two mathes the required harater Similarly, if input i n is high, o 1 will be high if byte n mathes the required harater The o 1 signal will be the i 1 input to a subsequent stage and will be lathed by its flip-flop Effetively this means that if the last byte of our group of bytes mathed the required harater, we ll be looking for the next math in the first byte of the next group of bytes

4 i 1 i n o 1 o 2 o n i 1 i n o 1 o 2 o n i 1 i n o 1 o n i o i o r1 r2 i o r1 i o r2 i o r1 (a) (b) () Figure 2 Multi-byte regular-expression NFA building bloks for ombination elements: (a) onatenation: r1r2, (b) alternation: r1 r2 and () star: r1* The resulting iruit from grouping suh bloks will be similar to the multi-byte approah presented by Cho et al in [14] but does not break up the pattern into N-byte hunks (repeated at eah of the N possible offsets) Sourdis and Pnevmatikatos [7] also present a multi-byte approah in whih the pattern is repeated at different offsets The approah presented here allows for a building-blok approah to the onstrution of an NFA and is oneptually leaner In addition to the multi-byte harater mathing blok, the single byte onatenation, alternation and star bloks of Sidhu and Prasanna an be extended to multiple bytes as shown in Fig 2 In the ase where n=1, the iruits redue to those shown in [2] A tool has been implemented in Tl [13] whih reads patterns in the format of Snort rules, forms regular expression parse trees, and then generates strutural VHDL desribing an NFA iruit whih mathes the given patterns The final alternation (ie or ombination) of all the patterns in the rule-set uses a pipelined or-tree so as not to be a bottle-nek The number of bytes to be onsidered in is an input parameter to the tool Charater math units generated by the tool take advantage of shared partial deoders as desribed in the following setion 4 Partial Charater Deoding Sidhu and Prasanna s approah (and that of many others) distributes eah input harater to eah harater math unit in the iruit and repliates omparators Clark and Shimmel [3] desribe a shared harater-deoder approah An 8-to- deoder is used to generate a single-bit math signal for eah harater These single-bit signals are then distributed to the appropriate harater math units, removing the overhead of distributing an 8-bit harater to eah harater math unit and performing redundant harater omparisons This approah saves logi resoures but does require a large number of global signals to be distributed around the FPGA Our work extends this approah by onsidering partial shared harater deoding Partial deoding means that instead of deoding all 8 bits of eah harater, we deode groups of bits within eah harater In this work, we onsidered breaking the 8 bits of eah harater into 1,2,3,4 and 8 groups as shown in Fig 3 (One group of 8 bits is not partial deoding - we onsider this deoding option to enable omparison between this approah and partial deoding) Shared partial deoding allows trade-offs between the amount of logi shared amongst the whole iruit (ie the number and size of the harater deoders) and the number of signals whih have to be routed around the FPGA As shown in Fig 3, the number of signals whih need to be distributed around the FPGA redues as the number of deoding groups inreases With full 8- to- deoding for eah harater, up to signals need to be distributed around the FPGA 3 from our shared deoder blok (though eah math unit will only need one of these signals) With four 2-to-4 deoders, for example, only 16 signals need to be distributed around the FPGA (though on average, eah signal will be needed in 16 times more plaes than with 8-to- deoding) If multiple (n) bytes are being proessed in, the number of signals to be distributed must be multiplied by n Partial deoding does inrease the omplexity of the harater math units With 8-to- deoding, the harater math unit (shown as bloks labelled C in Fig 1) beomes just a wire (as shown in Fig 4(a)) With partial deoding, an AND gate is required in eah harater math unit Fig 4 shows the required harater math units (ie C bloks) for eah of the partial deodings onsidered It is hypothesized that the ost of this is negligible given that the output 3 Fewer signals (and deoders) are needed if the pattern-spae does not use all possible haraters

5 (a) (b) () (d) (e) a 2 a 255 a 2 5 b 0 b 1 b 2 b Figure 3 Charater deoding options onsidered in this paper: (a) Eah harater is fully deoded (b) Eah harater is broken into two groups of four bits eah () Eah harater is broken into three groups of 3,3,2 bits (d) Eah harater is broken into four groups of 2 bits eah (e) Eah harater is broken into individual bits a 7 b 0 b 1 b a 2 a 3 b 0 b 1 b 2 b d 0 d 1 d 2 d 3 16 b 0 b d 0 d 1 e 0 e 1 f 0 f 1 g 0 g 1 h 0 h 1 16 (a) (b) () (d) (e) Figure 4 Charater math units required for eah of the five deoding options shown in Fig 3 of the harater math unit is ANDed with the urrent NFA state bit or other input (as shown in Fig 1) 5 Experimental Results In this setion we present the results of ombining partial-harater deoding with the modular onstrution of multi-byte regular expression NFAs A number of rule sets are onsidered We hose to target the Xilinx Virtex (speed grade 5) and Xilinx Virtex-E 2000 (speed grade 7) sine those devies are used as examples in a number of related studies 51 Rule-sets A number of rule-sets were onsidered in the experiments These were subsets of the Snort 200 ruleset as follows: web-attaks - the set of rules in the file web-attaksrules sql - the set of rules in the file sqlrules web-iis - the set of rules in the file web-iisrules default - the set of rules enabled by default in the 200 rule-set (ie those rules inluded in the snortonf file) Various harateristis of these rule-sets are shown in Table 1 The number of ontent patterns refers to the total number of ontent: or uriontent: strings in the rule-set The number of literals is the total number of haraters in eah of the ontent patterns for that rule-set The smaller rulesets were hosen based on their relative size (an approximate doubling of the number of literals from set to set) Table 1: Experimental rule-set harateristis Name Number of rules Number of ontent patterns Number of literals web-attaks sql web-iis default A number of artifiial rule sets of various sizes and lengths (with low inter-pattern ommonality) were also tested but results for these are not presented as little is added to the data presented below

6 52 Methodology Strutural VHDL was generated (by the tool desribed earlier) for eah of the iruits under test The design was passed through a standard Xilinx ISE 61 tool flow (xst, ngdbuild, map, par) with default options The only onstraint speified was the target lok period, whih was hosen to be 125 times the predited lok period reported by the synthesis tool This resulted in some designs being overonstrained (failing to meet the timing onstraint) and some underonstrained (easily meeting the timing onstraint) In all ases, the lok period (and hene maximum frequeny) reported is the Atual value reported by the plae-and-route tool The throughput reported (in Gbps) is the maximum frequeny obtained (in MHz) multiplied by 8 multiplied by the number of bytes being proessed in divided by 1024 For all of the rule-sets exept the largest ( default ), VHDL was generated, synthesized, plaed and routed for eah ombination of: the two devies being onsidered; the five deoding options; and the proessing of 1,2,3,4,5,6,7,8,10,12,14 and 16 bytes in For the large default rule set, only the proessing of 1,2 and 3 bytes in was onsidered for some of the five deoding options and only on the larger Virtex 2 devie Some ombinations were beyond the memory apaity of the omputer onerned even though the devie was not fully utilized 53 Performane Tables 2, 3, 4, and 5 show the results for the various rule-sets on the Virtex devie The tables list the throughput (in Gbps) for the given ombination of number of bytes proessed in and the style of harater deoding The number in parentheses in eah table entry is the proportion of 4-input lookup-tables (LUTs) utilized in the devie For eah given number of bytes proessed in, the deoding option whih produed the greatest throughput is shaded light gray Table 6 shows the results for the web-attaks rule-set on the Virtex-E 2000 devie Other results for this devie are omitted A disussion of the results is presented below 6 Disussion The most important onlusion to draw from the experimental results is that there is no obvious relationship between the style of harater deoding and the best performane (throughput) For any given rule-set and number of bytes to be proessed in, any one of the harater deoding styles ould produe the best performane The best hoie also depends on the devie hosen - for the web-attaks Table 2: Gbps throughput (LUT utilization%) for web-attaks rule-set on Virtex Bytes in () (05%) 268 (05%) 306 (05%) 268 (05%) 308 (2%) (06%) 536 (06%) 543 (08%) 461 (07%) 521 (3%) (08%) 863 (1%) 788 (13%) 7 (11%) 86 (34%) (12%) 106 (14%) 881 (17%) 843 (16%) 113 (4%) (17%) 137 (18%) 110 (22%) 135 (22%) 130 (48%) (21%) 133 (21%) 140 (27%) 153 (27%) 160 (54%) (25%) 168 (26%) 165 (33%) 167 (32%) 182 (62%) (3%) 193 (3%) 195 (37%) 194 (38%) 208 (63%) (38%) 239 (39%) 25 (47%) 235 (49%) 251 (8%) (46%) 272 (48%) 300 (57%) 280 (58%) 305 (89%) (54%) 351 (57%) 347 (67%) 365 (69%) 354 (102%) (62%) 399 (67%) 401 (75%) 401 (78%) 389 (108%) Table 3: Gbps throughput (LUT utilization%) for sql rule-set on Virtex Bytes in () (07%) 276 (07%) 285 (07%) 283 (07%) 33 (32%) (08%) 526 (08%) 486 (1%) 533 (11%) 429 (4%) (1%) 85 (11%) 771 (14%) 788 (2%) 659 (56%) (14%) 103 (15%) 107 (18%) 114 (25%) 884 (61%) (2%) 137 (2%) 131 (24%) 131 (28%) 108 (77%) (26%) 146 (25%) 139 (29%) 180 (35%) 13 (88%) (3%) 167 (29%) 168 (34%) 206 (38%) 151 (101%) (37%) 191 (34%) 191 (39%) 229 (44%) 162 (111%) (47%) 233 (43%) 235 (5%) 251 (54%) 206 (127%) (56%) 299 (54%) 230 (59%) 309 (64%) 237 (156%) (66%) 358 (63%) 360 (72%) 357 (76%) 329 (155%) (76%) 392 (74%) 388 (82%) 397 (85%) 329 (194%) Table 4: Gbps throughput (LUT utilization%) for web-iis rule-set on Virtex Bytes in () (23%) 319 (23%) 331 (22%) 278 (23%) 312 (46%) (26%) 511 (26%) 443 (32%) 445 (42%) 468 (56%) (3%) 813 (37%) 67 (5%) 631 (63%) 899 (91%) (42%) 893 (53%) 903 (65%) 879 (82%) 103 (105%) (59%) 111 (71%) 113 (84%) 112 (97%) 134 (147%) (76%) 128 (85%) 133 (103%) 130 (115%) 154 (167%) (91%) 151 (101%) 143 (119%) 147 (132%) 184 (195%) (109%) 218 (118%) 195 (139%) 170 (15%) 199 (216%) (14%) 212 (153%) 223 (181%) 210 (191%) 234 (266%) (165%) 255 (188%) 247 (218%) 249 (225%) 260 (314%) 14 Failed 301 (227%) 351 (258%) 303 (263%) 354 (366%) 16 Failed 392 (267%) 382 (301%) 347 (305%) 392 (414%) Table 5: Gbps throughput (LUT utilization%) for default rule-set on Virtex Bytes in 1 Failed 236 (202%) 2 Failed 392 (227%) 3 Failed 512 (285%) () (202%) 373 (364%) 513 (611%) 266 (203%) 356 (418%) 296 (613%) 252 (235%) 277 (389%) Did not fit

7 Table 6: Gbps throughput (LUT utilization%) for web-attaks rule-set on Virtex-E 2000 Bytes in () 3 rule-set (and also the other rule-sets, although these results are not shown) the best deoding option differed for the Virtex-E and Virtex-2 devies onsidered This is likely to be beause a devie s balane between logi and routing resoures may determine the most appropriate deoding approah for any given rule-set It should be noted that in all but a few ases, the full harater-deoding option (8-to- deoding) did not produe the best performane In most ases, however, it did produe the best logi utilization As expeted, throughput improves as the number of bytes proessed in inreases For the three smaller rule-sets, proessing 16 bytes in gave throughputs (for the best deoding option) at or near 40Gbps The best performane ahieved for the default rule-set was 513 Gbps when proessing 3 bytes in with three shared harater deoders (3-to- 8, 3-to-8 and 2-to-4) Higher performane is likely to be possible 61 Further Advantages of Partial Deoding Although not applied here, partial deoding of haraters would also allow improved implementation of pattern ranges (inluding ase-insensitivity) A redued number of signals and assoiated AND logi will be needed to math a range of haraters, eg, in the 4 deoder ase, only 3 of the 4 signals are needed to deode a pattern range in whih one of the 4 groups is wild (ie two of the bits of the harater are wild) 62 Further Optimizations (09%) 167 (09%) 208 (09%) 176 (09%) 185 (35%) (11%) 303 (11%) 344 (14%) 338 (12%) 328 (53%) (15%) 49 (18%) 489 (23%) 459 (2%) 466 (6%) (21%) 652 (24%) 579 (31%) 498 (29%) 605 (7%) (29%) 719 (31%) 642 (39%) 72 (39%) 768 (84%) (37%) 8 (38%) 821 (49%) 786 (47%) 876 (95%) (44%) 977 (46%) 964 (58%) 883 (56%) 974 (108%) (52%) 983 (53%) 111 (66%) 986 (67%) 103 (111%) (66%) 128 (69%) 131 (83%) 125 (84%) 139 (14%) (81%) 150 (85%) 154 (10%) 157 (102%) 163 (157%) (95%) 172 (101%) 173 (117%) 195 (121%) 180 (18%) (11%) 210 (118%) 206 (133%) 201 (138%) 202 (189%) A number of further optimizations are possible, inluding many that others have reported on Clark and Shimmel [3] implement prefix tree optimization in whih iruitry is eliminated for patterns with ommon prefixes This ourred in our work only to the extent that the synthesis tool reognised ommon logi Adding the apability to the iruit generator might redue synthesis time and give improved results Little attempt was made at pipelining in this work (other than the final or-ombination) As shown in [6], extensive fine-grained pipelining an produe even better performane (at the ost of lateny) An extension to support further regular expression meta-haraters may also redue generated iruit size as also shown in [6] 7 Conlusions This paper has presented an extension to the modular regular-expression to NFA onstrution method of Sidhu and Prasanna in order to handle multiple bytes in in an equivalent modular fashion The paper has also introdued the idea of shared partial harater deoding and demonstrated that full shared harater (8-to-) deoding is usually not the best approah to ahieve the best throughput The ideal partial deoding option has been experimentally shown to be dependent on the FPGA devie onerned, the number of bytes to be proessed in and the patterns to be implemented A program has been written whih onverts Snort rules to regular expressions and then applies the multi-byte modular NFA onstrution method to produe iruits whih math given patterns using a partiular deoding method and proessing a given number of bytes in The iruits generated are able to math against the omplete default Snort rule set at a throughput of over 5Gbps in a Xilinx Virtex devie Throughputs over 40Gbps are ahieved on smaller rule-sets Future work will involve inorporating further optimizations into the iruit generation program Referenes [1] (Aessed 1 June 2004) [2] Sidhu, R and Prasanna, VK, Fast Regular Expression Mathing using FPGAs, in Proeedings of 9th Annual IEEE Symposium on Field-Programmable Custom Computing Mahines (FCCM 01), April 2001 [3] Clark, CR and Shimmel, DE, Effiient Reonfigurable Logi Ciruits for Mathing Complex Network Intrusion Detetion Patterns, in Proeedings of FPL 2003, LNCS 2778, pp , Sep 2003 [4] Hoproft, JE and Ullman, JD, Introdution to Automata Theory, Languages and Computation Addison Wesley, Reading, MA, 1979 [5] Floyd, RW and Ullman, JD, The Compilation of Regular Expressions into Integrated Ciruits, Journal of ACM, vol 29, no 3, pp , July 1982 [6] Huthings, BL, Franklin, R and Carver, D, Assisting Network Intrusion Detetion with Reonfigurable

8 Hardware, in Proeedings of the 10th Annual IEEE Symposium on Field-Programmable Custom Computing Mahines (FCCM 02), April 2002 [7] Sourdis, I and Pnevmatikatos, D, Fast, Large-Sale String Math for 0Gbps FPGA-Based Network Intrusion Detetion System, in Proeedings of FPL 2003, LNCS 2778, pp , Sep 2003 [8] Mosola, J, Lokwood, J, Loui, RP and Pahos, M, Implementation of a Content-Sanning Module for an Internet Firewall, in Proeedings of 11th Annual IEEE Symposium on Field-Programmable Custom Computing Mahines (FCCM 03), April 2003 [9] Baker, ZK and Prasanna, VK, Time and Area Effiient Pattern Mathing on FPGAs, in Proeedings of FPGA 04, February 2004 [10] Dharmapurikar, S, Krishnamurthy, P, Sproull, TS and Lokwood, JW, Deep Paket Inspetion Using Parallel Bloom Filters, IEEE Miro, pp 52-61, Jan/ Feb 2004 [11] Gokhale, M, Dubois, D, Dubois, A, Boorman, M, Poole, S and Hogsett, V, Granidt: Towards Gigabit Rate Network Intrusion Detetion Tehnology, in Proeedings of FPL 2002, LNCS 2438, pp , Sep 2002 [12] Li, S, Torresen, J and Soraasen, O, Exploiting Reonfigurable Hardware for Network Seurity, in Proeedings of 11th Annual IEEE Symposium on Field-Programmable Custom Computing Mahines (FCCM 03), April 2003 [13] (Aessed 1 June 2004) [14] Cho, YH, Navab, S, Mangione-Smith, WH, Speialized Hardware for Deep Network Paket Filtering, in Proeedings of FPL 2002, LNCS 2438, pp , Sep 2002

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Zippy - A coarse-grained reconfigurable array with support for hardware virtualization

Zippy - A coarse-grained reconfigurable array with support for hardware virtualization Zippy - A oarse-grained reonfigurable array with support for hardware virtualization Christian Plessl Computer Engineering and Networks Lab ETH Zürih, Switzerland plessl@tik.ee.ethz.h Maro Platzner Department

More information

DECODING OF ARRAY LDPC CODES USING ON-THE FLY COMPUTATION Kiran Gunnam, Weihuang Wang, Euncheol Kim, Gwan Choi, Mark Yeary *

DECODING OF ARRAY LDPC CODES USING ON-THE FLY COMPUTATION Kiran Gunnam, Weihuang Wang, Euncheol Kim, Gwan Choi, Mark Yeary * DECODING OF ARRAY LDPC CODES USING ON-THE FLY COMPUTATION Kiran Gunnam, Weihuang Wang, Eunheol Kim, Gwan Choi, Mark Yeary * Dept. of Eletrial Engineering, Texas A&M University, College Station, TX-77840

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen The Heterogeneous Bulk Synhronous Parallel Model Tiani L. Williams and Rebea J. Parsons Shool of Computer Siene University of Central Florida Orlando, FL 32816-2362 fwilliams,rebeag@s.uf.edu Abstrat. Trends

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

Reading Object Code. A Visible/Z Lesson

Reading Object Code. A Visible/Z Lesson Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Reading Object Code. A Visible/Z Lesson

Reading Object Code. A Visible/Z Lesson Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Z8530 Programming Guide

Z8530 Programming Guide Z8530 Programming Guide Alan Cox alan@redhat.om Z8530 Programming Guide by Alan Cox Copyright 2000 by Alan Cox This doumentation is free software; you an redistribute it and/or modify it under the terms

More information

35 th Design Automation Conference Copyright 1998 ACM

35 th Design Automation Conference Copyright 1998 ACM Using Reongurable Computing Tehniques to Aelerate Problems in the CAD Domain: A Case Study with Boolean Satisability Peixin Zhong, Pranav Ashar, Sharad Malik and Margaret Martonosi Prineton University

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Design of High Speed Mac Unit

Design of High Speed Mac Unit Design of High Speed Ma Unit 1 Harish Babu N, 2 Rajeev Pankaj N 1 PG Student, 2 Assistant professor Shools of Eletronis Engineering, VIT University, Vellore -632014, TamilNadu, India. 1 harishharsha72@gmail.om,

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

High-level synthesis under I/O Timing and Memory constraints

High-level synthesis under I/O Timing and Memory constraints Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment Send Orders for Reprints to reprints@benthamsiene.net 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Improved Circuit-to-CNF Transformation for SAT-based ATPG

Improved Circuit-to-CNF Transformation for SAT-based ATPG Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany

More information

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes Redued-Complexity Column-Layered Deoding and Implementation for LDPC Codes Zhiqiang Cui 1, Zhongfeng Wang 2, Senior Member, IEEE, and Xinmiao Zhang 3 1 Qualomm In., San Diego, CA 92121, USA 2 Broadom Corp.,

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

speed and low area matching advantages of high speed and parallel processing [6]. It can

speed and low area matching advantages of high speed and parallel processing [6]. It can 227886165 FPGA I based High speed and low area matching cost pattern Jian Huang, Zongkai Yang, Xu Du, and Wei Liu Department of Electronic and Information Engineering, Huazhong University of Science and

More information

Automatic compilation framework for Bloom filter based intrusion detection

Automatic compilation framework for Bloom filter based intrusion detection Automatic compilation framework for Bloom filter based intrusion detection Dinesh C Suresh, Zhi Guo*, Betul Buyukkurt and Walid A. Najjar Department of Computer Science and Engineering *Department of Electrical

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

Design and Analysis of a Robust Pipelined Memory System

Design and Analysis of a Robust Pipelined Memory System Design and Analysis of a obust Pipelined Memory System Hao ang 1 Haiquan (Chuk) Zhao 2 Bill Lin 1 Jun (Jim) Xu 2 1 Department of Eletrial and Computer Engineering, University of California, San Diego Email

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Space- and Time-Efficient BDD Construction via Working Set Control

Space- and Time-Efficient BDD Construction via Working Set Control Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.

More information

Multiple Assignments

Multiple Assignments Two Outputs Conneted Together Multiple Assignments Two Outputs Conneted Together if (En1) Q

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems,"

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems, the overall working time for other appliations. In ase, data ltering was the only appliation being run, then using distributed indexing, we an serve 00 times as many requests. 6 Conlusion We have explored

More information

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else 3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and

More information

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Department of Eletrial and Computer Engineering University of Wisonsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 2014-2015 Assignment #2 Date Tuesday, September 25, 2014 Due

More information

The recursive decoupling method for solving tridiagonal linear systems

The recursive decoupling method for solving tridiagonal linear systems Loughborough University Institutional Repository The reursive deoupling method for solving tridiagonal linear systems This item was submitted to Loughborough University's Institutional Repository by the/an

More information